Home
        Eset Smart Security 7, ITA, 2U, 1Y
         Contents
1.                                                    iV    Anti Phishing protection  7  6 C  Users petko  AppData  Local  Apps 2 0 3OEOSYOH  YWG WZNK20LC  3RC macr  t a   Q Parental control  7   amp  c  Users petko  AppData  Local Microsoft Windows Temporary Internet Files Conter        Update E    amp 7 C  Users petko WppData Local Temp  InstHelper exe  2 X Tools  E  E   Windows Microsoft  NET  Framework v2 0 50727 dfsvc exe  E   User interface 7  lc  Windows Microsoft  NET Frameworkly2 0 507271dw20 exe   71 87  c  WindowslSystem32W ogonUI exe   rj  E  C  Windows System32lsass exe   7    amp 7 C  Windows  System32 services exe  77    amp 71 c  Windows System32 svchost exe  P   8 7C  Windows System32lwermgr exe    4     D                            60    4 3 3 3 Excluded IP addresses    The entries in the list will be excluded from protocol content filtering  HTTP POP3 IMAP communication from to  the selected addresses will not be checked for threats  We recommend that you only use this option for addresses  that are known to be trustworthy     Add IPv4 IPv6 address     Click to add an IP address address range subnet of a remote point to which a rule is  applied     Remove     Remove selected entries from the list        Advanced setup                             ll Computer Addresses exduded from protocol filtering  a a Network Selected IP addresses will be exduded from protocol filtering  HTTP  POP3  IMAP    B  Web and email       Address  10  1 2 3       i S E Email dient pr
2.                     All operations mentioned above v  Create a rule valid only for target  C Windows explorer exe x    amp   Hide advanced options Search ESET Knowledge Base   www eset com    The Allow access to another application dialog window allows you to create a rule based on any new action that    HIPS detects and then define the conditions under which to allow or deny that action  Click Show Options to define    37    the exact parameters for your new rule  Rules created this way are considered equal to rules created manually  soa  rule created from a dialog window can be less specific than the rule that triggered that dialog window  This means  that after creating such a rule  the same operation can trigger another dialog window if the parameters that your  previous rule set do not apply to the situation     Temporarily remember this action for this process causes an action  Allow   Deny  to be used until a change of rules  or filtering modes  a HIPS module update or a system restart  After any of these actions  temporary rules will be  deleted     4 1 5 Gamer mode    Gamer mode is a feature for users that demand uninterrupted usage of their software  do not wish to be disturbed  by pop up windows and want to minimize CPU usage  Gamer mode can also be used during presentations that  cannot be interrupted by antivirus activity  By enabling this feature  all pop up windows are disabled and the  activity of the scheduler will be completely stopped  System protection sti
3.               ssss  95  5 6 2 1 Program Controls  aereo xor espe ratio ai re ir ea Tea 95  5 6 2 2 Navigating in ESET SysInspector                     eeeeeeeeneee 96  516 2 2 1  Keyboards liorteuts         certe ce oer Nen Renee 98  5 6 2 3 COMPA E M                            99  5 6 3 Command line parameters                      eee 100  5 6 4 Service SCUIDES snossecsncsaiadiorasiachasaadanesioassassesesaarsnaniaasaca 101  5 6 4 1 GeneratingService SCHMID se seo nena 101  5 6 4 2 Structure ofthe Service script          sssssssesssssssseess 101  5 6 4 3 EXECUTING Service SCHIDUS ceci cree ortas bao choro a xin 104  5 6 5 FAQ                                          M 104  5 6 6 ESET SysInspector as part of ESET Smart Security           106  ESET SYSRESCUC         sssssssssesssssscsscescescescessessessessessesseescesseseeseesees 106  57 1 Minimum requirements                  sese 106    5 8    6     6 1    6 2    6 3    6 4    5 7 2 How to create rescue CD    rores casas 107  5 7 3 Target seleCtiOTnz u unice eee rrr penser B xe ea nene 107  5 7 4 SEINES ETE Rm 107  5 7 4 1 prr pe                    tastes 108  5 7 4 2 ESET AntiVirUs          ese oett tnr stretta i an eka seriis 108  5 7 4 3 AdvancedisettinBs     iiii ince eiie tee iia ed re nier RE ERE 108  5 7 4 4 Internet protocol    ione dee ie che tor ed bI opea 109  5 7 4 5 Bootable USB device    trn rete t venu 109  5 7 4 6 i                            109  5 7 5 Working with ESET SysRescue                   eeseeeeee
4.           Show advanced options Search ESET Knowledge Base   www eset com    Please be careful when creating new rules and only allow connections that you know are secure  If all connections  are allowed  then the Personal firewall fails to accomplish its purpose  These are the important parameters for  connections       Remote side     Only allow connections to trusted and known addresses     Local application   It is not advisable to allow connections for unknown applications and processes     e Port number   Communication on common ports  e g   web traffic     port number 80  should be allowed under  normal circumstances     In order to proliferate  computer infiltrations often use the Internet and hidden connections to help them infect    remote systems  If rules are configured correctly  a Personal firewall becomes a useful tool for protection against a  variety of malicious code attacks     49    4 2 6 Logging    The ESET Smart Security Personal firewall saves all important events in a log file  which can be viewed directly from  the main menu  Click Tools  gt  Log files and then select Personal firewall from the Log drop down menu     The log files can be used to detect errors and reveal intrusions into your system  ESET Personal firewall logs contain  the following data     Date and time of event  Name of event  Source    Target network address   Network communication protocol   Rule applied  or name of worm  if identified  Application involved   e User    A thorough 
5.          Go Back Proceed to the site    Open ESET KnowledgeBase www eset com          NOTE  Potential phishing websites that have been whitelisted will expire after several hours by default  To allowa  website permanently  you can use the URL address management tool  From Advanced setup  F5  click Web and  email  gt  Web access protection  gt  URL address management and from the URL address management drop down  menu Select List of allowed addresses and add your website to this list     Phishing site reporting  The Report a phishing site link enables you to report a phishing malicious website to ESET for analysis     NOTE  Before submitting a website to ESET  make sure it meets one or more of the following criteria      the website is not detected at all      the website is incorrectly detected as a threat  In this case  please referto the Remove phishing site link   Alternatively  you can submit the website by email  Send your email to samples Qeset com  Remember to use a  descriptive subject and enclose as much information about the website as possible  e g   the website you referred  it from  how did you hear about it           4 4 Parental control    The Parental control module allows you to configure parental control settings  which provide parents with  automated tools to help protect their children and set restrictions for using devices and services  The goal is to  prevent children and young adults from accessing pages with inappropriate or harmful content     Parenta
6.          The Setup menu contains following       Computer     Network     Web and Email    Parental control    Click any component to adjust the advanced settings of the corresponding protection module   Computer protection setup allows you to enable or disable the following components       Real time file system protection     All files are scanned for malicious code when they are opened  created or run  on your computer      HIPS     The HIPS system monitors the events within the operating system and reacts to them according to a  customized set of rules      Anti Theft     You can also enable or disable ESET Anti Theft from here    e Gamer mode     Enables or disables Gamer mode  You will receive a warning message  potential security risk  and  the main window will turn orange after enabling Gamer mode      Anti Stealth protection     Detects dangerous programs  such as rootkits  which hide themselves from the  operating system and ordinary testing techniques     The Network section allows you to enable or disable the Personal firewall     Parental control lets you block webpages that may contain potentially offensive material  In addition  parents can  prohibit access to more than 40 pre defined website categories and over 140 subcategories     18    Web and Email protection setup allows you to enable or disable the following components       Web access protection     If enabled  all traffic through HTTP or HTTPS is scanned for malicious software    e Email client protect
7.       70    4 5 1 Update settings    Update setup options are available from the Advanced setup tree  F5 key  by clicking Update    Settings  This section  specifies update source information  such as the update servers and authentication data for these servers  In the  home version of ESET products you are not able to choose own update server  Update files will automatically be  downloaded from the ESET server with the least network traffic  The Update server drop down menu is only  available in ESET Endpoint Antivirus or ESET Endpoint Security     For updates to be downloaded properly  it is essential that all update information is entered correctly  If you use a  firewall  please make sure that the program is allowed to communicate with the Internet  HTTP communication is  enabled                                              6  mm  Advanced setup   lt Computer Selected profile   lit Network  My profile X     Profiles       H  Web and email        Parental control Update settings for selected profile  5  Update Username  Password   i EAV 12345678 9999999999  i Update rollback m     B    Tools  9  Regular update     Pre release update  B EM User in Advanced update setup   Clear update cache   Do not display notification about successful update  Q search ox   canst   tate              Your current update profile is displayed in the Selected profile drop down menu  Click Profiles    to create a new  profile     Authentication for update servers is based on the Username and Pas
8.      Device control setup options can be modified in Advanced setup  F5     Computer    Device control     Selecting the check box next to Integrate into system activates the Device control feature in ESET Smart Security   you will need to restart your computer for this change to take effect  Once Device control is enabled  Configure  rules    will become active  allowing you to open the Device control rules editor window     33    If the inserted external device applies an existing rule that performs the Block action  a notification window will  pop up in the lower right corner and access to the device will not be granted     4 1 3 1 Device control rules    The Device control rules editor window displays existing rules and allows for precise control of external devices  that users connect to the computer                                               Device Control Rule sec  Define rules to control the use of devices on your system  per user or per groups of users  The order or rules defines their priority   Enabled Name Type Description Action Severity Add   gt  Block USB    Disk Storage Vendor  Games company  Inc   Model    Block Edit  2  M Rule FireWire S    Vendor    Model     Serial Number       Read Write C  Delete  Top  Up  Down      m   r Bottom   lt  xml version  1 0  encoding  utf 8    gt   lt ESET  gt   lt RULE NAME  Block USB for user  LOGSEV  0  ENABLED  1        m   r  Ca  p  h          Particular devices can be allowed or blocked per user or user group and base
9.      x  e View temporary IP address blacklist  0 items        Ee  Advanced Personal firewall setup          Block all network traffic  disconnect network  All inbound and outbound communication will be blocked by the  Personal firewall  Use this option only if you suspect critical security risks that require the system to be  disconnected from the network     Disable filtering  allow all traffic is the opposite of blocking all network traffic  If selected  all Personal firewall  filtering options are turned off and all incoming and outgoing connections are permitted  This has the same effect  as no firewall being present  While Network traffic filtering is in Blocking mode  clicking Switch to filtering mode  will re enable the firewall     Automatic filtering mode  when Automatic filtering mode is enabled   To change the filtering mode  click Switch  to interactive filtering mode     Interactive filtering mode  when Interactive filtering mode is enabled      To change the filtering mode  click Switch  to automatic filtering mode  with user defined rules      Configure rules and zones        Opens the Zone and rule setup window  which allows you to define how the firewall  will handle network communication     Change the protection mode of your computer in the network        This setting defines how accessible your  computer is to other computers on the network     select between strict or allowed protection mode     View temporary IP address blacklist        View a list of IP
10.     By default the automatic startup file check will be performed on system startup and during virus signature database  updates  This scan is dependent upon the Scheduler configuration and tasks     The startup scan options is part of a System startup file check scheduler task  To modify its settings  navigate to  Tools    Scheduler  click on Automatic startup file check and then Edit     In the last step  the Automatic startup file  check window will appear  see the following chapter for more details      For detailed instructions about Scheduler task creation and management  see Creating new tasks     26    4 1 1 3 1 Automatic startup file check    When creating a System startup file check scheduled task  you have several options to adjust the following  parameters     The Scan level drop down menu specifies the scan depth for files run at system startup  Files are arranged in  ascending order according to the following criteria     e Only the most frequently used files  least files scanned     Frequently used files     Commonly used files     Rarely used files     All registered files  most files scanned     Two specific Scan level groups are also included     e Files run before user logon     Contains files from locations that may be accessed without the user being logged in   includes almost all startup locations such as services  browser helper objects  winlogon notify  Windows  scheduler entries  known dll s  etc        Files run after user logon     Contains files fr
11.     Event occurred on a new file created by the application  C  Program Files Internet  Explorer iexplore exe       Clean    Noacton         w  Show advanced options Search ESET Knowledge Base   www eset com    Apply cleaning if a file has been attacked by a virus that has attached malicious code to the file  If this is the case   first attempt to clean the infected file in order to restore it to its original state  If the file consists exclusively of  malicious code  it will be deleted     If an infected file is  locked  or in use by a system process  it will usually only be deleted after it is released   normally after a system restart      Multiple threats    If any infected files were not cleaned during Computer scan  or the Cleaning level was set to No Cleaning   an alert  window prompting you to select actions for those files is displayed  Select actions forthe files  actions are set  individually for each file in the list  and then click Finish     Deleting files in archives    In Default cleaning mode  the entire archive will be deleted only if it contains infected files and no clean files  In  other words  archives are not deleted if they also contain harmless clean files  Use caution when performing a Strict  cleaning scan  with Strict cleaning enabled an archive will be deleted if it contains at least one infected file  regardless of the status of other files in the archive     If your computer is showing signs of a malware infection  e g   itis slower  often freez
12.     Intelligent Firewall    ESET Antispam    ESET Anti Theft    Proactively detects and cleans more known and unknown viruses  worms   trojans and rootkits  Advanced heuristics technology flags even never   before seen malware  protecting you from unknown threats and  neutralizing them before they can do any harm  Web access protection and  Anti Phishing works by monitoring communication between web browsers  and remote servers  including SSL   Email client protection provides control  of email communication received through the POP3 S  and IMAP S   protocols     Regularly updating virus signature database and program modules is the  best method for ensuring the maximum level of security on your computer     You can check the reputation of running processes and files directly from  ESET Smart Security     Automatically scans all USB flash drives  memory cards and CDs DVDs  Blocks  removable media based on type of media  manufacturer  size and other  attributes     You can customize the behavior of the system in greater detail  specify rules  for the system registry  active processes and programs  and fine tune your  security posture     Postpones all pop up windows  updates or other system intensive activities  to conserve system resources for gaming or other full screen activities     Protects your family from potentially offensive web content by blocking  various website categories     Firewall module prevents unauthorized users from accessing your computer  and taking adva
13.    Blocked and allowed web pages    Neutral Age under 8 X 1M  Chats  amp  Forums    X Not Categorized w  Fashion  amp  Beauty X File Downloading  vV Not Resolved v Health  amp  Medical X Content Servers  v Life Style    Information Technology X Business Services     Finance and money v Maps Age under 16 7  W Organizations  Government  amp  Legal w  News X Pharmacy  amp Health  w  Games w  Government  amp  Institutions X Alcohol and Tobacco  v Professional v Wikis X File sharing  j  vo v Fitness  amp  Recreation X Alternative Religion  amp  Occult  v Education w  Email  amp  SMS X Online Marketing  W Communication  amp  Social Networking W    Entertainment Age under 18  v Art  amp Entertainment Age under 13 X Adult Content 3  Coa   undo         Moving the mouse over a category will show you a list of web pages that fall into that category  Here are some  examples of categories  groups  that users might not be familiar with     e Miscellaneous     Usually private  local  IP addresses such as intranet  127 0 0 0 8  192 168 0 0 16  etc  When you  get a 403 or 404 error code  the website will also match this category    e Not resolved   This category includes web pages that are not resolved because of an error when connecting to the  Parental control database engine    e Not categorized     Unknown web pages that are not yet in the Parental control database    e Proxies     Web pages such as anonymizers  redirectors or public proxy servers can be used to obtain  anonymous   access
14.    Its aim is to gain access to sensitive data such as bank account numbers   PIN codes  etc     Access is usually achieved by sending email masquerading as a trustworthy person or business  e g   financial  institution  insurance company   The email can look very genuine  and will contain graphics and content which may  have originally come from the source it is impersonating  You will be asked to enter  under various pretenses  data  verification  financial operations   some of your personal data     bank account numbers or usernames and  passwords  All such data  if submitted  can easily be stolen and misused     Banks  insurance companies  and other legitimate companies will never request usernames and passwords in an  unsolicited email     6 4 4 Recognizing spam scams    Generally  there are a few indicators which can help you identify spam  unsolicited emails  in your mailbox  If a  message fulfills at least some of the following criteria  itis most likely a spam message     e Sender address does not belong to someone on your contact list      You are offered a large sum of money  but you have to provide a small sum first      You are asked to enter  under various pretenses  data verification  Financial operations   some of your personal  data     bank account numbers  usernames and passwords  etc       t is written in a foreign language      You are asked to buy a product you are not interested in  If you decide to purchase anyway  please verify that the  message sende
15.    version   preserve time    Exit codes    0  1  10  50  100    do not scan mailboxes   scan self extracting archives  default    do not scan self extracting archives   scan runtime packers  default    do not scan runtime packers   scan for potentially unsafe applications   do not scan for potentially unsafe applications  default   scan for potentially unwanted applications   do not scan for potentially unwanted applications  default   scan for suspicious applications  default    do not scan for suspicious applications   use signatures  default    do not use signatures   enable heuristics  default    disable heuristics   enable Advanced heuristics  default    disable Advanced heuristics   scan only EXTENSIONS delimited by colon   exclude EXTENSIONS delimited by colon from scanning  use cleaning MODE for infected objects    The following options are available    e none   No automatic cleaning will occur    e standard  default      ecls exe will attempt to automatically clean or delete infected files    e strict     ecls exe will attempt to automatically clean or delete infected files without user  intervention  you will not be prompted before files are deleted       rigorous     ecls exe will delete files without attempting to clean regardless of what the file is    e delete     ecls exe will delete files without attempting to clean  but will refrain from deleting  sensitive files such as Windows system files     copy infected files  if cleaned  to Quarantine   supplements th
16.   1 hour  selected month      The graph is refreshed every hour and the timeline covers the last X selected  months    The vertical axis of the File system activity graph represents read data  blue  and written data  red   Both values are  given in KB  kilobytes  MB GB  If you mouse over either read data or written data in the legend below the graph   the graph will only display data for that activity type     79    You can also select Network activity from the Activity drop down menu  The graph display and options for File  system activity and Network activity are the same except that the latter displays received data  red  and sent data   blue      4 6 5 ESET Sysinspector    ESET SysInspector is an application that thoroughly inspects your computer and gathers detailed information about  system components such as installed drivers and applications  network connections or important registry entries  and assesses the risk level of each component  This information can help determine the cause of suspicious system  behavior that may be due to software or hardware incompatibility or malware infection     The SysInspector window displays the following information about created logs     e Time     The time of log creation    e Comment    A short comment    e User   The name of the user who created the log   e Status     The status of log creation     The following actions are available     e Compare     Compares two existing logs   e Create        Creates a new log  Please wait un
17.   An action  selection dialog will be displayed where you can decide to mark the certificate as trusted or excluded  If the  certificate is not present in the TRCA list  the window is red  If the certificate is on the TRCA list  the window will be  green     You can select Block communication that uses the certificate to always terminate an encrypted connection to the  site that uses the unverified certificate     If the certificate is invalid or corrupt  it means that the certificate expired or was incorrectly self signed  In this case   we recommend that you block the communication that uses the certificate     4 3 3 4 1 1 Trusted certificates    In addition to the integrated Trusted Root Certification Authorities store where ESET Smart Security stores trusted  certificates  you can create a custom list of trusted certificates that can be viewed in Advanced setup  F5     Web and  email  gt  Protocol filtering  gt  SSL  gt  Certificates  gt  Trusted certificates  ESET Smart Security will check the content of  encrypted communications utilizing certificates in this list     To delete the selected items from the list  click Remove  Click Show  or double click the certificate  to display  information about the selected certificate     62    4 3 3 4 1 2 Excluded certificates    The Excluded certificates section contains certificates that are considered safe  The content of encrypted  communications utilizing the certificates in the list will not be checked for threats  We recomm
18.   Depending on the response type  itis possible to determine which ports are in use  The scanning itself  causes no damage  but be aware that this activity can reveal potential vulnerabilities and allow attackers to take  control of remote computers     Network administrators are advised to block all unused ports and protect those that are in use from unauthorized  access     6 2 5 TCP desynchronization    TCP desynchronization is a technique used in TCP Hijacking attacks  It is triggered by a process in which the  sequential number in incoming packets differs from the expected sequential number  Packets with an unexpected  sequential number are dismissed  or saved in the buffer storage  if they are present in the current communication  window      In desynchronization  both communication endpoints dismiss received packets  at which point remote attackers are  able to infiltrate and supply packets with a correct sequential number  The attackers can even manipulate or modify  communication     TCP Hijacking attacks aim to interrupt server client  or peer to peer communications  Many attacks can be avoided  by using authentication for each TCP segment  It is also advised to use the recommended configurations for your  network devices     6 2 6 SMB Relay    SMB Relay and SMB Relay 2 are special programs that are capable of carrying out attacks against remote computers   The programs take advantage of the Server Message Block file sharing protocol  which is layered onto NetBIOS  
19.   File version     Information from the application publisher      Product name     Application name and or business name     NOTE  Reputation can also be checked on files that do not act as running programs processes     mark files you want  to check  right click them and select Advanced options    Check File Reputation using ESET Live Grid      8  Scan with ESET Smart Security  Advanced options     8  Scan without cleaning       Quarantine file    Submit files for analysis          4 6 8 Network connections    In the Network connections section  you can see a list of active and pending connections  This helps you control all  applications establishing outgoing connections                          SMART SECURITY v   4 Tools Network connections  4S Home          Application Local IP Remote IP Pr    Up     Do    Sent Rec        svchost exe 0B s OB s OB 0B    Q Computer scan  5   svchost exe 0B s OB s OB 0B  H FileZilla server exe 0 B s 0 B s 0B 0B  c iexplore exe 0 B s 0 B s 284B 1 3 KB     Update Aaa T  s      iexplore exe 0B s OB s 7 9KB 3014 KB    rl Setup  10 1 08 94 49985 173 194 39 159 80 TCP     0B s  0B s  509B 538B   410 1 108 94 49986 173 194 44 31 80 TCP OB s 0 B s 3 8 KB 944KB      410 1 108 94 49987 173 194 44 31 80 TCP OB s 0 B s 2 5 KB 1750KB   x Tools     10 1 108 94 49988 173 194 39 145 80 TCP 0B s 0 B s 732B 30 9 KB   10 1 108 94 49989 173 194 39 143 30 TCP 0 B s 0 B s 356 B 473B        Help and support  Protocol  TCP 6    Transmission Control Protocol  Local
20.   For each type  direction  of communication  you can select the following actions          Allow     To allow communication    e   Ask  You will be prompted to allow or deny each time communication is established    e X Deny   To deny communication    e   Specific     Cannot be classified with respect to the other actions  For example  if an IP address or port is  allowed through the Personal firewall it cannot be classified with certainty  whether incoming or outgoing  communications of a related application are allowed     When installing a new application that accesses the network or when modifying an existing connection  remote  side  port number  etc    a new rule must be created  To edit an existing rule  click the Rules tab and then click Edit     43    4 2 3 1 1 Detailed view of all rules    To see the following information in the Zone and rule setup window  click Toggle detailed view of all rules                                                                                                                        e           laum   Rules define how the firewall will handle network communication  Rules can allow or deny particular applications  remote computers and   specific ports communication  For more information about rules  click here    Toggle application tree view Display rules used in the profile  All    Name Action Protocol Address Local port Remote port Application a  W  Allow alle    19 GRE amp    All Al All All s  W   Alowinbo    9 TCP  amp    Localaddre
21.   Network    Hg       E            us                                     Infected items are not cleaned automatically  Scanning without cleaning can be used to obtain an overview of the  current protection status  If you are only interested in scanning the system without additional cleaning actions   select Scan without cleaning  Furthermore  you can choose from three cleaning levels by clicking Setup     gt   Cleaning  Information about scanning is saved to a scan log     You can choose a profile from the Scan profile drop down menu to be used for scanning chosen targets  The default  profile is Smart scan  There are two more pre defined scan profiles called In depth scan and Context menu scan   These scan profiles use different ThreatSense engine parameters  Click Setup    to set up chosen scan profile from  the Scan profile menu in detail  The available options are described in Scanner setup     Click Save to save changes made to your target selection  including selections made within the folder tree structure   Click Scan to execute the scan using the custom parameters that you have set     Scan as Administrator allows you to execute the scan under the Administrator account  Click this if the current user  doesn t have privileges to access the appropriate files to be scanned  Note that this button is not available if the  current user cannot call UAC operations as Administrator     4 1 1 2 2 Scan progress    The scan progress window shows the current status of the scan a
22.   On Windows XP systems where UAC  is not running  users will have the Require administrator rights  system without UAC support  option available     Show protection timeout dialog     Selecting this will cause a dialog window denoting the duration of time left with  protection disabled to be displayed any time that you temporarily disable protection from the program menu or in  the ESET Smart Security  gt  Setup section     4 7 5 Program menu    Some of the most important setup options and features are available in the main program menu     Ce Je je        w v       Maximum protection    Frequently used   gt  Home  1   gt  Statistics       Block network     Temporarily disable protection     Temporarily disable firewall  Advanced setup     Log files    Reset window layout  Activate your product     About    Frequently used     Displays the most frequently used parts of ESET Smart Security  You can quickly access these from  the program menu     Temporarily disable protection     Displays the confirmation dialog box that disables Antivirus and antispyware    90    protection  which guards against malicious system attacks by controlling file  web and email communication  Select  Do not ask again to avoid this message in the future     The Time interval drop down menu represents the period of time that Antivirus and antispyware protection will be  disabled for           Time interval    10 minutes M    Temporarily disables protection for a selected time period   Disabling prote
23.   Toagle detailed view of all rules Display rules used in the profile    All X  Application   Rule Trusted zone in Trusted zone out Internetin Internet out  i Allow outgoing IGMP messages      Allow incoming IGMP messages     Allow incoming UDP multicast streams                               C scrguru settings   H E 7 Host Process for Windows Services   i   Specific   i     Le  Windows Logon User Interface Host Specific Specific    4 8   Services and Controller app   Specific   Specific   Specific   Specific    s  Local Security Authority Process 4 Allow   Specific y Allow z i E      fj Windows Logon Application v Allow   Specific v Allow z   gl z      T           Windows Logon User Interface Host  Microsoft Corporation   6 1 7600  16385  win7_rtm 090713 1255   inal name  logonui exe         Microsoft Corporation  All rights reserved      New   Edit Delete  Del                    At the beginning of each line corresponding to a rule  there is a button allowing you to expand collapse       the  information  Click on the name of the application in the Application   Rule column to display information about the  rule at the bottom of this window  You can use the contextual menu to change the display mode  The contextual  menu can be also used for adding  editing and deleting rules     Trusted zone in out     Actions related to incoming or outgoing communication within the Trusted zone   Internet in out     Internet connection related actions to incoming or outgoing communication 
24.   allowed or    exduded from checking  Particular lists are grouped by type           Q  Search                                               i  List of addresses exduded from filtering  List of blocked addresses  List of allowed addresses  v  List active Notify when applying address from the list   d main com   Add         Edt      Remove      Export                    Cc  Goa  Geen           Add    From file     Allows you to add an address to the list  either manually  click Add   or from a simple text file   click From file   The From file option allows you to add multiple URL addresses masks saved in a text file     Edit        Manually edit addresses     for example by adding a mask      and          Remove Remove all     Click Remove to delete the selected address from the list  To delete all addresses  select    Remove all     Export        Save addresses from the current list to a simple text file     58    4 3 3 Protocol filtering    Antivirus protection for the application protocols is provided by the ThreatSense scanning engine  which seamlessly  integrates all advanced malware scanning techniques  The control works automatically  regardless of the Internet  browser or email client used  For encrypted  SSL  communication see Protocol filtering  gt  SSL     Enable application protocol content filtering     If enabled  all HTTP S   POP3 S  and IMAP S  traffic will be checked  by the antivirus scanner     NOTE  Starting with Windows Vista Service Pack 1  Windows 7 an
25.   run the program and click File  gt  Open Log in the main program  window  You can also drag and drop log files onto the ESET SysInspector application  If you need to frequently view  ESET SysInspector log files  we recommend creating a shortcut to the SYSINSPECTOR EXE file on your Desktop  you  can then drag and drop log files onto it for viewing  For security reasons Windows Vista 7 may not allow drag and  drop between windows that have different security permissions     104    Is aspecification available for the log file format  What about an SDK      At the current time  neither a specification for the log file or an SDK are available since the program is still in  development  After the program has been released  we may provide these based on customer feedback and  demand     How does ESET SysInspector evaluate the risk posed by a particular object      In most cases  ESET SysInspector assigns risk levels to objects  files  processes  registry keys and so forth  using a  series of heuristic rules that examine the characteristics of each object and then weight the potential for malicious  activity  Based on these heuristics  objects are assigned a risk level from 1  Fine  green  to 9   Risky  red   In the left  navigation pane  sections are colored based on the highest risk level of an object inside them     Does a risk level of  6   Unknown  red   mean an object is dangerous      ESET SysInspector s assessments do not guarantee that an object is malicious     that deter
26.  4 ESET Ei Scis METER 116   url                        Q 117  6 4 1 Advertise merits  sv d eere peu me cote eod ee e cancdhensbuecanets 17  6 4 2 IAE P TEEPEE EEE ATE EET 117  6 4 3 DAOEIDI GERE 118  6 4 4 Recognizing spam SCAM S isse iins 118  6 4 4 1 Rules     118  6 4 4 2 l nire                     119  6 4 4 3 Blacklist                            119  6 4 4 4 EXCEPTIONS Tis scctsessteepctasteesschins  tance EER AARSET 119  6 4 4 5 Server Side control               eessseeee eene 119    1  ESET Smart Security    ESET Smart Security represents a new approach to truly integrated computer security  The most recent version of  the ThreatSense   scanning engine  combined with our custom Personal firewall and Antispam modules  utilizes  speed and precision to keep your computer safe  The result is an intelligent system that is constantly on alert for  attacks and malicious software that might endanger your computer     ESET Smart Security is a complete security solution that combines maximum protection and a minimal system  footprint  Our advanced technologies use artificial intelligence to prevent infiltration by viruses  spyware  trojan  horses  worms  adware  rootkits  and other threats without hindering system performance or disrupting your    computer     Features and benefits    Antivirus and antispyware    Regular updates  ESET Live Grid     Cloud powered Reputation     Device control    HIPS functionality    Gamer mode    Features in ESET Smart Security  Parental control
27.  Never update program components     Program component updates will not be performed at all  This option is  suitable for server installations  since servers can usually be restarted only when they are undergoing  maintenance      Always update program components     A program component update will be downloaded and installed  automatically  Please remember that a computer restart may be required    e Ask before downloading program components   The default option  You will be prompted to confirm or refuse  program component updates when they become available     After a program component update  it may be necessary to restart your computer to provide full functionality of all  modules  The Restart after program component upgrade section allows you to select one of the following options     e Never restart computer     You will not be asked to restart  even if it is required  Please note that this is not  recommended  since your computer might not work properly until the next restart      Offer computer restart if necessary     The default option  After a program component update  you will be  prompted to restart your computer in a dialog window       f necessary  restart computer without notifying     After a program component upgrade  your computer will be  restarted  if required      NOTE  Selecting the most appropriate option depends on the workstation where the settings will be applied   Please be aware that there are differences between workstations and servers  For exam
28.  SCAM enpiri v seipsa bene rper rd va e de eu pul 26  4 1 1 3 1 Automatic startup file check                         eeeeeeeeeeeess 27  4 1 1 4 Idle state scanning               eesssssessseseeeeeee nemen 27  4 1 1 5 Exelusi fig o inal erg n De a eim s vx Pa v ERES bx erbe n p a rr ipi 27  4 1 1 6 ThreatSense engine parameters setup                        29  4 1 1 6 1  Objects  i5 erre e rere rere ine edere dea axeads 29  DWROEIOD NERO SI ERRORES 29  4 1 1 6 3  CleaininB ccr rri e hie euet 30  4 1 T 6 4   SEXtenStIOTlS  suis iras pes exse s poe or posa ns Fass iive e EOFFONY FE Fe ENS   d RES PIAT 30  CREE C NE METRE 30    1155  JORGE idus veras e Rame rds voi rh cba co eo PRA PRA E 31  4 1 1 7 An infiltration is detected            cccceccccssseeeceeeeeeeeesaeeeeees 31  4 1 1 8 Document BrOTGCEUOfL neia 33  4 1 2 Removable Media           ccccccecsececscesssseeeseuseeeuseeseseueesens 33  4 1 3 Device CODELO l ise ees do Rest aeds die CO edu e qued En ER 33  4 1 3 1 Device control rules                 eeseeeeeen nene 34    4 2    4 3    4 4    4 5                  4 1 3 2   4 1 4   4 1 5   VISUS                     39  4 2 1 Filtering modes    cuiii oer perd ne rero ccena 40  4 2 1 1 Learningimode          cu cure ree eere ceca cones cts Cu easaenvaneene    41  4 2 2 Firewall profiles    ien ir rore in rb cenis 42  4 2 3 Configuring and using rules    42  4 2 3 1 Rules setup                 essssse  43  4 2 3 1 1 Detailed view ofall rules     44  4 2 3 2 Editing rules    se
29.  When adding or editing a profile  you can also define the conditions that trigger it     When creating a profile  you can select events that will trigger the profile  The following options are available   e Do not switch automatically     The automatic trigger is turned off  the profile must be activated manually        When the automatic profile becomes invalid and no other profile is activated automatically  default profile       When the automatic profile becomes invalid  ie  if the computer is connected to an untrusted network     see  section Network authentication  and another profile is not activated in its place  the computer is not connected  to another trusted network   the Personal firewall will switch to this profile  Only one profile can use this trigger     e If this zone is authenticated     This profile will be triggered when the specified zone is authenticated  see section  Network authentication      When the Personal firewall switches to another profile  a notification will appear in the lower right corner by the  system clock     4 2 3 Configuring and using rules    Rules represent a set of conditions used to meaningfully test all network connections and all actions assigned to  these conditions  Using Personal firewall rules  you can define the action that is taken when different types of  network connections are established  To access the rule filtering setup  navigate to Advanced setup  F5     Network     Personal firewall    Rules and zones     Click 
30.  Zone authentication section when setting up a zone in the firewall setup     48    4 2 5 Establishing connection   detection    The Personal firewall detects each newly created network connection  The active firewall mode determines which  actions are performed for the new rule  If Automatic mode or Policy based mode is activated  the Personal firewall  will perform predefined actions with no user interaction     Interactive mode displays an informational window that reports detection of a new network connection   supplemented with detailed information about the connection  You can opt to allow the connection or refuse   block  it  If you repeatedly allow the same connection in the dialog window  we recommend that you create a new  rule for the connection  To do this  select Remember action  create rule  and save the action as a new rule for the  Personal firewall  If the firewall recognizes the same connection in the future  it will apply the existing rule without  requiring user interaction     ESET SMART SECURITY 7    Inbound traffic    Trusted zone    A remote computer from a Trusted zone is attempting to communicate with an  application running on this computer  Do you wish to allow this communication     Application  B FileZilla Server   Publisher  Unknown   Reputation   lf Discovered 1 year ago  Remote computer  scrgurul hq eset com  10 1 108 55   Local port  21  ftp             Remember action  create rule                 Temporarily remember action for the process  
31.  action     Triggers a scheduled shutdown or reboot when the computer scan  finishes  Once the scan has finished  a shutdown confirmation dialog window will open with a 60 second timeout   Click this option again to deactivate the selected action     4 1 1 2 3 Scan profiles    Your preferred scan parameters can be saved for future scanning  We recommend that you create a different profile   with various scan targets  scan methods and other parameters  for each regularly used scan     To create a new profile  open the Advanced setup window  F5  and click Computer    Antivirus and antispyware     On demand computer scan  gt  Profiles     The Configuration profiles window includes the Selected profile drop   down menu that lists existing scan profiles and the option to create a new one  To help you create a scan profile to  fit your needs  see the ThreatSense engine parameters setup section for a description of each parameter of the  scan setup     Example  Suppose that you want to create your own scan profile and the Smart scan configuration is partially  suitable  but you don t want to scan runtime packers or potentially unsafe applications and you also want to apply  Strict cleaning  In the Configuration profiles window  click Add     Enter the name of your new profile in the Profile  name field and select Smart scan from the Copy settings from profile drop down menu  Adjust the remaining  parameters to meet your requirements and save your new profile     4 1 1 3 Startup scan
32.  address  petko PC hq eset com  10 1 108 94   Remote address  muc03507 in f31 1e100 net  173 194 44 31   Local port  49990  Remote port  HTTP 80    Hypertext Transfer Protocol  WWW   Received  1 3 KB 0 B s   Sent  284 B 0 B s   Using the right mouse button will activate a context menu for the selected item    es  eT Configure connection view             The first line displays the name of the application and its data transfer speed  To see the list of connections made  by the application  and also more detailed information   click       Application Local IP     Name of application  local IP addresses and communication ports   Remote IP     IP address and port number of the particular remote computer    Protocol     Transfer protocol used    Up Speed Down Speed   The current speed of outgoing and incoming data   Sent Received     Amount of data exchanged within the connection     Open in a new window   Displays information in a separate window     83    The Configure connection view    option in the Network connections screen enters the advanced setup structure for  this section  enabling you to modify connection view options     Resolve host names     If possible  all network addresses are displayed in DNS format  not in the numeral IP address  format     Only show TCP protocol connections     The list only displays connections which belong to the TCP protocol suite     Show connections with open ports on which the computer is listening     Select this option to only display 
33.  addresses that have been detected as the source of attacks  and added to the blacklist to block connection for a certain period of time  For more information  click this option  and then press F1     39    Advanced Personal firewall setup        Allows you to access the advanced firewall setup options     4 2 1 Filtering modes    Four filtering modes are available for the ESET Smart Security Personal firewall  Filtering modes can be found in  Advanced setup  F5  by clicking Network    Personal firewall  The behavior of the firewall changes based on the  selected mode  Filtering modes also influence the level of user interaction required                        6  x  Advanced setup   ll Computer Personal firewall  lilt Network Filtering mode  j ua eem irre rre LL   LA L4 A B   S  STSIISEEREABEEAEEREEERERR  i i Log msadad   Automatic mode      Lg IDS exceptions Interactive mode  PP iii Policy based mode  Learning mode Learning mode  Application modification detection   E System integration  H 8 Web and email Firewall user profiles      Parental control The Personal firewall behavior can be quickly altered using profiles  Custom rules can be set  H Q Update to be applied in particular profiles   H 2 Tools Selected profile   H B User interface         Profiles      a  seach CE a       iin             Filtering can be performed in one of four modes     Automatic mode   The default mode  This mode is suitable for users who prefer easy and convenient use of the  firewall with no nee
34.  all  system notifications are sent to the administrator     4 7 3 Hidden notification windows    If Do not show this message again is selected for any notification window  alert  that was previously displayed that  notification  it will appear in the list of hidden notification windows  Actions that are now executed automatically  are displayed in the Confirm column     Show     Shows a preview of notification windows that are currently not displayed and for which an automatic action  is configured     Remove     Removes items from the Hidden messageboxes list  All notification windows removed from the list will  be displayed again     4 7 4 Access setup    ESET Smart Security settings are a crucial part of your security policy  Unauthorized modifications can potentially   endanger the stability and protection of your system  To password protect your setup parameters  from the main  menu click Setup  gt  Enter advanced setup     gt  User interface  gt  Access setup  select Password protect settings and   click Set password  Note that your password is case sensitive     Require full administrator rights for limited administrator accounts     Select this to prompt the current user  if he or  she does not have administrator rights  to enter an administrator username and password when modifying certain  system parameters  similar to the User Account Control  UAC  in Windows Vista and Windows 7   Such  modifications include disabling protection modules or turning off the firewall
35.  at the specified time interval   e Daily     The task will run repeatedly each day at the specified time    e Weekly   The task will be run on the selected day and time     5  If the task could not be run at the predefined time  you can specify when it will be performed again     e Wait until the next scheduled time  e Run the task as soon as possible  e Runthe task immediately if the time since the last task execution exceeds    hours    6  In the last step you can review the task to be scheduled  Click Finish to apply the task        The task has been scheduled   Scheduled task overview  Task name    Scan    Task type   On demand computer scan     Run task   Task will be run only once on 16  5  2011 at 17 38 46     Action to take if the task is not run at the specified time   Task will not be run     Run the task with specific parameters          78    4 6 3 Protection statistics    To view a graph of statistical data related to ESET Smart Security s protection modules  click Tools  gt  Protection  statistics  Select the desired protection module from the Statistics drop down menu to see the corresponding graph  and legend  If you mouse over an item in the legend  only the data for that item will display in the graph     The following statistic graphs are available       Antivirus and Antispyware protection     Displays the number of infected and cleaned objects      File system protection     Only displays objects that were read or written to the file system      Email cl
36.  bit  x64   128MB RAM of system memory  320 MB available space   Super VGA  800 x 600     Microsoft  Windows  8 1  8  7  Vista  Home Server    1 GHz 32 bit  x86    64 bit  x64   512MB RAM of system memory  320 MB available space   Super VGA  800 x 600     1 3 Prevention    When you work with your computer  and especially when you browse the Internet  please keep in mind that no  antivirus system in the world can completely eliminate the risk of infiltrations and attacks  To provide maximum  protection and convenience  it is essential that you use your antivirus solution correctly and adhere to several  useful rules     Update regularly    According to statistics from ESET Live Grid  thousands of new  unique infiltrations are created each day in order to  bypass existing security measures and bring profit to their authors     all at the expense of other users  The  specialists at the ESET Virus Lab analyze these threats on a daily basis and prepare and release updates in order to  continually improve the level of protection for our users  To ensure the maximum effectiveness of these updates it  is important that updates are configured properly on your system  For more information on how to configure  updates  see the Update setup chapter     Download security patches    The authors of malicious software often exploit various system vulnerabilities in orderto increase the  effectiveness of spreading malicious code  With this in mind  software companies watch closely for any  vu
37.  but may affect the  performance of your computer in a negative way   Read more about these types of applications in the glossary       Potentially unsafe applications refers to legitimate commercial software that has the potential to be misused for  malicious purposes  Examples of potentially unsafe applications include remote access tools  password cracking  applications  and keyloggers  programs recording each keystroke typed by a user   This option is disabled by  default    Read more about these types of applications in the glossary       Potentially suspicious applications include programs compressed with packers or protectors  These types of  protectors are often exploited by malware authors to evade detection     Anti Stealth technology is a sophisticated system that provides the detection of dangerous programs such as  rootkits  which are able to hide themselves from the operating system  This means itis not possible to detect them  using ordinary testing techniques     4 1 1 1 Real time file system protection    Real time file system protection controls all antivirus related events in the system  All files are scanned for  malicious code at the moment they are opened  created or run on your computer  Real time file system protection  is launched at system startup     Real time file system protection checks all types of media and is triggered by various system events such as  accessing a file  Using ThreatSense technology detection methods  as described in the Threat
38.  connecting to ESET servers  Once these profiles are  configured  navigate to Tools    Scheduler and edit the update task parameters  Designate one profile as primary  and the other as secondary     Selected profile     The currently used update profile  To change it  choose a profile from the drop down menu   Add      Create new update profiles     The bottom part of the window lists existing profiles     5 2 Keyboard shortcuts    Key shortcuts that can be used when working with ESET Smart Security include     Ctrl G disables GUI in the product   Ctrl I opens the ESET SysInspector page   Ctrl L opens the Log files page   Ctrl S opens the Scheduler page   Ctrl Q opens the Quarantine page   Ctrl U opens a Username and Password setup   Ctrl R resets window to its default size and position on the screen    For better navigation in your ESET product  the following keyboard shortcuts can be used     F1 opens help pages   F5 opens Advanced setup   Up Down navigation in product through items  T expands Advanced setup tree node    92      collapses Advanced setup tree nodes  TAB moves the cursor in a window  Esc closes the active dialog window    5 3 Diagnostics    Diagnostics provides application crash dumps of ESET processes  for example  ekrn   If an application crashes  a  dump will be generated  This can help developers to debug and fix various ESET Smart Security problems  Two  dump types are available       Complete memory dump   Records all the contents of system memory when 
39.  connections  where no communication is currently established  but the system has opened a port and is waiting for  a connection     Also show connection within the computer     Select this option to only show connections  where the remote side is  a local system     so called localhost connections     Right click on a connection to see additional options that include     Deny communication for the connection     Terminates the established communication  This option is available only  after clicking on an active connection     Show details     Choose this option to display detailed information about the selected connection    Refresh speed     Choose the frequency to refresh the active connections    Refresh now     Reloads the Network connections window    The following options are available only after clicking on an application or process  not an active connection     Temporarily deny communication for the process     Rejects current connections for the given application  If a new  connection is established  the firewall uses a predefined rule  A description of the settings can be found in the  Rules and zones section     Temporarily allow communication for the process     Permits current connections for the given application  If a new  connection is established  the firewall uses a predefined rule  A description of the settings can be found in the  Rules and zones section     84    4 6 9 Quarantine    The main function of the quarantine is to safely store infected files  F
40.  currently scanned file extensions     To enable the scanning of files without an extension  select Scan extensionless files  Do not scan extensionless  files becomes available when Scan all files is enabled     Excluding files is sometimes necessary if scanning certain file types prevents the program that is using certain  extensions from running properly  For example  it may be advisable to exclude the  edb   eml and  tmp extensions  when using Microsoft Exchange servers     Using the Add and Remove buttons  you can allow or prohibit scanning of specific file extensions  Typing an  Extension activates the Add button  which adds the new extension to the list  Select an extension in the list and  then click Remove to delete that extension from the list     The special symbols    asterisk  and    question mark  can be used  The asterisk substitutes any character string  and  the question mark substitutes any symbol  Particular care should be taken when specifying excluded addresses   because the list should only contain trusted and safe addresses  Similarly  it is necessary to ensure that the symbols    and   are used correctly in this list     To scan the default set of extensions only  click Default and click Yes when prompted to confirm     4 1 1 6 5 Limits    The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned     Maximum object size     Defines the maximum size of objects to be scanned  The given antivirus modul
41.  e    tree structure section contains modified values   files   e   the risk level has decreased   it was higher in the previous log  e athe risk level has increased   it was lower in the previous log    The explanation section displayed in the left bottom corner describes all symbols and also displays the names of  logs which are being compared     99    Log Status   Currentlog   Generated    Previous Log  Sysinspector LOG 110725 1042 xmi  Loaded ZIP   Compare  Comparison Result        Compare Icons Legend Y    Agdeditem Added Item s  in Branch     Removed item Removed Item s  in Branch      File Replaced Added or Removed       Status Was Lowered Item s  in Branch   A Status Was Raised    File s  Replaced in Branch    Any comparative log can be saved to a file and opened at a later time     Example    Generate and save a log  recording original information about the system  to a file named previous xml  After  changes to the system have been made  open ESET SysInspector and allow it to generate a new log  Save it to a file  named current xml     In order to track changes between those two logs  click File  gt  Compare logs  The program will create a comparative  log showing differences between the logs     The same result can be achieved if you use the following command line option     Syslsnpector exe current xml previous xml    5 6 3 Command line parameters    ESET SysInspector supports generating reports from the command line using these parameters      gen generate log d
42.  email  optional      Your contact email can be included with any suspicious files and may be used to contact  you if further information is required for analysis  Please note that you will not receive a response from ESET unless  more information is needed     Select Enable logging to create an event log to record file and statistical information submissions  This will enable  logging to the Event log when files or statistics are sent     81    4 6 7 Running processes    Running processes displays the running programs or processes on your computer and keeps ESET immediately and  continuously informed about new infiltrations  ESET Smart Security provides detailed information on running  processes to protect users with ESET Live Grid technology                                                         ESET Smart Security E SE E    SMART SECURITY v  4 Tools Running processes   uj Fume This window displays a list of running processes with additional information from ESET Live Grid   The risk level of each is indicated  along with the number of users and time of first discovery   Q Computer scan  Process Risk    Numbe   Time of dis    Application name     p m  smss exe a 2 years ago Microsoft   Windo      Update   ew 3   E     fm T  esrss exe e 2 years ago Microsoft amp  Windo         amp  wininit exe w 2 years ago Microsoft   Windo     Qe Setup i  a winlogon exe a 2 years ago Microsoft amp  Windo     B  services exe a 2 years ago Microsoft amp  Windo    E  CE v en 2 years ago Micr
43.  exe  HKCU SOFTWARE Microsoft Windows CurrentVersion Run    Google Update      C  Users antoniak AppData Local Google Update GoogleUpdate exe     c    Category  Internet Explorer  7 items   HKLM Software Microsoft Internet Explorer Main     Default Page URL   http   thatcrack com    Ls                 The marked entries will be deleted  reduced to O byte values or reset to their default values upon script execution     The action to be applied to a particular entry depends on the entry category and key value in the specific registry     07  Services    This section lists services registered within the system     Example     07  Services      Name  Andrea ADI Filters Service  exe path  c  windows system32 aeadisrv exe  state  Running   Startup  Automatic     Name  Application Experience Service  exe path  c  NwindowsNsystem32Naelupsvc dll  state  Running   startup  Automatic     Name  Application Layer Gateway Service  exe path  c  windows system32 alg exe  state  Stopped   startup  Manual    kered    The services marked and their dependent services will be stopped and uninstalled when the script is executed     08  Drivers    This section lists installed drivers     Example     08  Drivers      Name  Microsoft ACPI Driver  exe path  c  windows system32 drivers acpi sys  state  Running   startup  Boot     Name  ADI UAA Function Driver for High Definition Audio Service  exe path  c  windows system32   drivers adihdaud sys  state  Running  startup  Manual    Ls     When you exec
44.  firewall  etc         Log entries older than the specified number of days in the Automatically delete records older than X days field will  automatically be deleted     Optimize log files automatically     If checked  log files will be automatically be defragmented if the percentage is  higher than value specified in the If the number of unused records exceeds  96  field     Click Optimize now to begin defragmenting the log files  All empty log entries are removed during this process   which improves performance and log processing speed  This improvement can be observed especially if the logs  contain a large number of entries     4 6 2 Scheduler    Scheduler manages and launches scheduled tasks with predefined configuration and properties     The Scheduler can be accessed from the ESET Smart Security main program window by clicking Tools  gt  Scheduler   The Scheduler contains a list of all scheduled tasks and configuration properties such as the predefined date  time  and scanning profile used     The Scheduler serves to schedule the following tasks  virus signature database update  scanning task  system  startup file check and log maintenance  You can add or delete tasks directly from the main Scheduler window  click  Add    or Delete at the bottom   Right click anywhere in the Scheduler window to perform the following actions   display detailed information  perform the task immediately  add a new task  and delete an existing task  Use the    77    checkboxes at the begin
45.  is required  since each day our servers receive tens of thousands of files  making it  impossible to reply to all submissions     4 6 13 System updates    The Windows update feature is an important component of protecting users from malicious software  For this  reason  it is vital that you install Microsoft Windows updates as soon as they become available  ESET Smart Security  notifies you about missing updates according to the level you specify  The following levels are available       No updates     No system updates will be offered for download      Optional updates     Updates marked as low priority and higher will be offered for download      Recommended updates     Updates marked as common and higher will be offered for download     Important updates     Updates marked as important and higher will be offered for download    e Critical updates     Only critical updates will be offered for download     Click OK to save changes  The System updates window will be displayed after status verification with the update  server  Accordingly  the system update information may not be immediately available after saving changes     4 7 Userinterface    The User interface section allows you to configure the behavior of the program s Graphical user interface  GUI    Using the Graphics tool  you can adjust the program s visual appearance and effects used     By configuring Alerts and notifications  you can change the behavior of detected threat alerts and system  notifications  These 
46.  messages that have been  classified as spam  The default is   SPAM       Move messages to spam folder     When enabled  spam messages will be moved to the default junk email folder   Use the folder     This option moves spam to a user defined folder     Mark spam messages as read     Select this to automatically mark spam as read  It will help you to focus your  attention on  clean  messages     Mark reclassified messages as unread     Messages originally classified as spam  but later marked as  clean  will be  displayed as unread     55    Spam score logging    The ESET Smart Security Antispam engine assigns a spam score to every scanned message  The message will be  recorded in the antispam log  ESET Smart Security  gt  Tools  gt  Log files  gt  Antispam protection        Do not write     The Score cell in the Antispam protection log will be empty    e Write only reclassified messages and messages marked as SPAM      Select this if you want to record a spam score  for messages marked as SPAM      Write all messages     All messages will be recorded to the log with a spam score     Start email client antispam protection automatically     When enabled  antispam protection will be activated  automatically on system startup     Allow advanced antispam control     Additional antispam databases will be downloaded  increasing antispam  capabilities and producing better results     ESET Smart Security supports Antispam protection for Microsoft Outlook  Outlook Express  Windows Mai
47.  of  the main program window  Navigation window to the left  the Description window to the right and the Details  window at the bottom of the main program window  The Log Status section lists the basic parameters of a log  filter  used  filter type  is the log a result of a comparison etc                                                                                         5 6 2 1 Program Controls    This section contains the description of all program controls available in ESET SysInspector     File    By clicking File you can store your current system status for later investigation or open a previously stored log  For  publishing purposes we recommend that you generate a log Suitable for sending  In this form  the log omits  sensitive information  current user name  computer name  domain name  current user privileges  environment  variables  etc       NOTE  You may open previously stored ESET SysInspector reports by dragging and dropping them into the main  program window     Tree  Enables you to expand or close all nodes and export selected sections to Service script   List    Contains functions for easier navigation within the program and various other functions like finding information  online     ESET SYSINSPECTOR  Detail   Ful  gt   Filtering   jum Fine Find      Find     Risk Level 1 9  N J    Status Section  Running processes  gt  smss exe    Process Path PID Username s  Network Connections E  Important Registry Entries Y System x E  Services Module System  Bi Driv
48.  possible to leave the choice of action to the user  Each rule consists of conditions  which have to be met   before a rule is applied and a particular action is performed   Basic setup Other settings  Name  Example rule    V  Rule activated       v L  Action  Block    n   V  Notify user  Source applications   Target files   Target applications   Target registry  Overthese applications  a C  Windows vexplorer exe  Ote C  Windows  notepad exe  F  Debugging another application DN  Intercept events from another application      Teminate suspend another application  F  Start new application  V  Modify state of another application      m   r  L  Use for all operations Add      Add group Edit   Remove 4    cancel         If you select Ask as the default action  ESET Smart Security will display a dialog window every time an operation is    run  You can choose to Deny or Allow the operation  If you do not choose an action  an action will be selected based    on the pre defined rules     ESET SMART SECURITY 7    A Allow access to another application     Host based Intrusion Prevention System  HIPS     Application  C  Program Files Internet Explorer iexplore exe    Access type  Terminate suspend another application  Modify state of another  application    Target  C  Windows explorer exe    Allow Deny    Temporarily remember this action for this process       Create rule                v  Create a rule valid only for this application        v  Create a rule valid only for operation     
49.  recommend that you select another drive with  more free space available  Otherwise compilation may end prematurely due to insufficient free disk space     External applications     Allows you to specify additional programs that will be run or installed after booting from a  ESET SysRescue medium     Include external applications     Allows you to add external programs to the ESET SysRescue compilation     Selected folder     Folder in which programs to be added to the ESET SysRescue disk are located     5 7 4 2 ESET Antivirus    For creating the ESET SysRescue CD  you can select between two sources of ESET files to be used by the compiler     ESS EAV folder     Files already contained in the folder to which the ESET Security solution is installed on the  computer     MSI file     Files contained in the MSI installer are used     Next  you can choose to update the location of   nup  files  Normally  the default option ESS EAV folder MSI file  should be selected  In some cases  a custom Update folder can be chosen  e g   to use an older or newer virus  signature database version     You can use one of the following two sources of username and password   Installed ESS EAV     Username and password will be copied from the currently installed ESET Security solution   From user     Username and password entered in the corresponding fields will be used     NOTE  ESET Security solution on the ESET SysRescue CD is updated either from the Internet or from the ESET  Security solution i
50.  recommend that you uninstall any other antivirus programs on your system  See our ESET Knowledgebase  article for a list of uninstaller tools for common antivirus software  available in English and several other  languages      2 1 Live installer    Once you have downloaded the Live installer installation package  double click the installation file and follow the  step by step instructions in the installer window     Important  For this type of installation you must be connected to Internet        ESET SMART SECURITY       English          Install ESET Smart Security    All in one PC security   ESET Smart Security combines NOD32 Antivirus  an antispam and a  personal firewall to protect your valued data from all kinds of  computer threats  including malware  hacker attacks  and social media  scams    Internet connection is required    Select your desired language from the Select product language drop down menu and click Install  Allow a few  moments for installation files to download        After you accept the End User License Agreement  you will be prompted to configure ESET Live Grid  ESET Live Grid  helps ensure that ESET is immediately and continuously informed about new threats in order to protect our  customers  The system allows you to submit new threats to the ESET Virus Lab where they are analyzed  processed  and added to the virus signature database     By default  Yes    want to participate is selected  which will activate this feature     The next step in the in
51.  server of any computer into believing that  the fake data they supplied is legitimate and authentic  The fake information is cached for a certain period of time   allowing attackers to rewrite DNS replies of IP addresses  As a result  users trying to access Internet websites will  download computer viruses or worms instead of their original content     114    6 2 3 Worm attacks    A computer worm is a program containing malicious code that attacks host computers and spreads via a network   Network worms exploit security vulnerabilities in various applications  Due to the availability of the Internet  they  can spread all over the world within a few hours of their release     Most worm attacks  Sasser  SglSlammer  can be avoided by using default security settings in the firewall  or by  blocking unprotected and unused ports  Also  itis essential that your operating system is updated with the most  recent security patches     6 2 4 Port scanning    Port scanning is used to determine which computer ports are open on a network host  A port scanner is software  designed to find such ports     A computer port is a virtual point which handles incoming and outgoing data    this is crucial from a security point of  view  In alarge network  the information gathered by port scanners may help to identify potential vulnerabilities   Such use is legitimate     Still  port scanning is often used by hackers attempting to compromise security  Their first step is to send packets to  each port
52.  the  computer      Outbound Internet traffic     A local application attempting to establish a connection to another computer     Rule creation policy     This section allows you to define parameters to be added into newly created rules     Add local port   Includes the local port number of the network communication  For outgoing communications   random numbers are usually generated  For this reason  we recommend enabling this option only for incoming  communications     Add application     Includes the name of the local application  This option is suitable for future application level  rules  rules which define communication for an entire application   For example  you can enable communication  only for a web browser or email client     Add remote port   Includes the remote port number of the network communication  For example you can allow or  deny a specific service associated with a standard port number  HTTP     80  POP3     110  etc      Add remote IP address   Trusted zone     A remote IP address or zone can be used as a parameter for new rules  defining all network connections between the local system and that remote address   zone  This option is suitable  if you want to define actions for a certain computer or a group of networked computers     Maximum number of different rules for an application     If an application communicates through different ports to  various IP addresses  etc   the firewall in learning mode creates appropriate count of rules for this applic
53.  the network can be marked as an Internet browser  The check box is two state     e Deselected   Communication of applications is filtered only for specified ports     Selected   Communication is always filtered  even if a different port is set      59    4 3 3 2 Excluded applications    To exclude communication of specific network aware applications from content filtering  select them in the list   HTTP POP3 IMAP communication of the selected applications will not be checked for threats  We recommend  using this option only for applications that do not work properly with their communication being checked     Running applications and services will be available here automatically  Click Add    to manually select an application  not shown on the protocol filtering list                     SSS    _   _    Advanced setup         i Applications excluded from protocol filtering  E Network Selected applications will be excluded from protocol filtering  HTTP  POP3  IMAP      T   amp  c  Program Files ESET ESET Smart Security  equi exe       C  Program Files ESETYESET Smart Security ekrn exe   QC  Program Files ESET ESET Smart Security SysInspector exe  e C  Program Files Internet Explorer  iexplore exe  C  Program Files  TechSmith Snagit 10 TscHelp exe     C  Program Files Windows Defender  MpCmdRun exe          H E Email dient protection   aI Web access protection     Protocol filtering   I Exduded applications  Exduded IP addresses                                                   
54.  threats  which helps us focus on the right targets  ESET Live Grid data plays an important role in setting  priorities in our automated processing     Additionally  itimplements a reputation system that helps to improve the overall efficiency of our anti malware  solutions  When an executable file or archive is being inspected on a user s system  its hash tag is first compared  against a database of white  and blacklisted items  If itis found on the whitelist  the inspected file is considered    116    clean and also flagged to be excluded from future scans  If it is on the blacklist  appropriate actions are taken based  on the nature of the threat  If no match is found  the file is scanned thoroughly  Based on the results of this scan   files are categorized as threats or non threats  This approach has a significant positive impact on scanning  performance     This reputation system allows for effective detection of malware samples even before their signatures are  delivered to user s computer via updated virus database  which happens several times a day      6 4 Email    Email  or electronic mail  is a modern form of communication with many advantages  It is flexible  fast and direct   and played a crucial role in the proliferation of the Internet in the early 1990 s     Unfortunately  with a high level of anonymity  email and the Internet leave room for illegal activities such as  spamming  Spam includes unsolicited advertisements  hoaxes and proliferation of malicious so
55.  to the Enable HIPS and Enable Self defense settings will take effect after Windows is restarted  Disabling  the HIPS system also requires a computer restart to take effect     Exploit Blocker is designed to fortify commonly exploited application types such as web browsers  PDF readers   email clients and MS Office components  Read more about this type of protection in the glossary     Advanced memory scanner works in combination with Exploit Blocker to strengthen protection against malware  that has been designed to evade detection by antimalware products through the use of obfuscation and or  encryption  Read more about this type of protection in the glossary     HIPS Filtering can be performed in one of four modes       Automatic mode with rules     Operations are enabled and a set of pre defined rules are used protect your system   Interactive mode     User will be prompted to confirm operations    Policy based mode   Operations not defined by a rule can be blocked    Learning mode     Operations are enabled and a rule is created after each operation  Rules created in this mode  can be viewed in the Rule editor  but their priority is lower than the priority of rules created manually or rules  created in automatic mode  After selecting Learning mode  the Notify about learning mode expiration in X days  option becomes active  After the time period defined in the Notify about learning mode expiration in X days is  over  learning mode is disabled again  The maximum time perio
56.  to web pages that are usually prohibited by the Parental control filter    e File sharing     These web pages contain large amounts of data such as photos  videos or e books  There is a risk  that these sites contain potentially offensive material or adult content     67    4 4 2 Blocked and allowed web pages    Enter a URL address into the blank field under the list  select Allow or Block and click Add to add it to the list  To  delete an URL address from the list  click the remove button       jozko Help               Web page content filtering   Blocked and allowed web pages             Allowed and blocked web pages list  w allowedpage com  x   X blockedpage com  X                      pe Ba  Block         Undo    In the URL address list  the special symbols    asterisk  and    question mark  cannot be used  For example  web  page addresses with multiple TLDs must be entered manually  examplepage com  examplepage sk  etc    When you  enter a domain to the list  all content located on this domain and all subdomains  e g  sub examplepage com  will  be blocked or allowed based on your choice of URL based action                    Note  Blocking or allowing a specific web page can be more accurate than blocking or allowing a whole category of  web pages  Be careful when changing these settings and adding a category web page to the list     4 5 Updating the program    Regularly updating ESET Smart Security is the best method to ensure the maximum level of security on your  com
57.  version of ESET Smart Security   information about your computer s operating system version and Location settings  The statistics are normally  delivered to ESET servers once or twice a day     Do not submit files     Suspicious files  resembling infiltrations in their content or behavior  are not submitted to  ESET for analysis by means of ESET Live Grid technology     Advanced setup      Opens a window with additional ESET Live Grid settings     If you have used ESET Live Grid before and have disabled it  there may still be data packages to send  Even after  deactivating  such packages will be sent to ESET on the next occasion  Afterwards  no further packages will be  created     4 6 6 1 Suspicious files    The Files tab in ESET Live Grid advanced setup allows you to configure how threats are submitted to ESET Virus Labs  for analysis     If you find a suspicious file  you can submit it for analysis to our ThreatLabs  If it is a malicious application  its  detection will be added to the next virus signature update     Exclusion filter     The Exclusion filter allows you to exclude certain files folders from submission  The files listed  will never be sent to ESET s labs for analysis  even if they contain a suspicious code  For example  it may be useful to  exclude files that may carry confidential information  such as documents or spreadsheets  The most common file  types are excluded by default   doc  etc    You can add to the list of excluded files if desired     Contact
58.  which will be displayed in the header of notification  emails     Recipient address     This field specifies the recipient address which will be displayed in the header of notification  emails     Send event notifications to LAN computers by means of Messenger service     Select this check box to send messages  to LAN computers via the Windows  messaging service     Send notifications to the following computers  delimited by a comma      Enter the names of computers that will  receive notifications via the Windows  messaging service     Interval between sending messages  sec       To change the length of the interval between notifications sent via  LAN  enter the desired time interval in seconds     Minimum verbosity for notifications     Specifies the minimum verbosity level of notifications to be sent     Edit format      Communications between the program and a remote user or system administrator are done via  emails or LAN messages  using the Windows  messaging service   The default format of the alert messages and  notifications will be optimal for most situations  In some circumstances  you may need to change the message  format   click Edit format        4 6 11 1 Message format  Here you can set up the format of event messages that are displayed on remote computers   Threat alert and notification messages have a predefined default format  We advise against changing this format     However  in some circumstances  for example  if you have an automated email processing s
59.  will be allowed to cancel it and  install the program without adware     Some programs will not install without adware  or their functionality will be limited  This means that adware may  often access the system in a  legal  way  because users have agreed to it  In this case  it is better to be safe than  sorry If there is a file detected as adware on your computer  it is advisable to delete it  since there is a high  probability that it contains malicious code     6 1 6 Spyware    This category covers all applications which send private information without user consent awareness  Spyware uses  tracking functions to send various statistical data such as a list of visited websites  email addresses from the user s  contact list  or a list of recorded keystrokes     The authors of spyware claim that these techniques aim to find out more about users  needs and interests and  allow better targeted advertisement  The problem is that there is no clear distinction between useful and  malicious applications and no one can be sure that the retrieved information will not be misused  The data  obtained by spyware applications may contain security codes  PINs  bank account numbers  etc  Spyware is often  bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for  purchasing the software  Often  users are informed of the presence of spyware during a program s installation to  give them an incentive to upgrade to a paid version without i
60.  with unsolicited content     To modify behavior of the action that will be performed when a removable media is inserted into the computer   CD DVD USB       press F5to open the Advanced setup window and expand Computer    Antivirus and antispyware     Removable media and select the default action in the Action to take after inserting removable media drop down  menu  If the Show scan options option is selected  a notification will display which allows you to choose a desired  action       Scan now     An on demand computer scan of the inserted removable media device will be performed   e Scan later     No action will be performed and the New device detected window will be closed     Setup      Opens the Removable media setup section     ESET SMART SECURITY 7 x    A New device detected    CD DVD  LGE Mobile  F      s Scan now   s Scan later     Setup                Always use the selected option       4 1 3 Device control    ESET Smart Security provides automatic device  CD DVD USB      control  This module allows you to scan  block or  adjust extended filters permissions and define a users ability to access and work with a given device  This may be  useful if the computer administrator wishes to prevent use of devices with unsolicited content by users     Supported external devices    e CD DVD    Disk storage  e FireWire storage    Note  Device control in ESET Endpoint Security or ESET Endpoint Antivirus used in a corporate environment supports more types of  external devices
61. 18 1c01 16 214 22ff fec9 ca5      Subnet     Subnet  a group of computers  is defined by an IP address and mask  for example  2002 c0a8 6301 1  1 64      61    4 3 3 4 SSL protocol checking    ESET Smart Security enables you to check protocols encapsulated in SSL protocol  You can use various scanning  modes for SSL protected communications using trusted certificates  unknown certificates  or certificates that are  excluded from SSL protected communication checking     Always scan SSL protocol     Select this option to scan all SSL protected communications except communications  protected by certificates excluded from checking  If anew communication using an unknown  signed certificate is  established  you will not be notified and the communication will automatically be filtered  When you access a  server with an untrusted certificate that is marked as trusted  it is added to the trusted certificates list    communication to the server is allowed and the content of the communication channel is filtered     Ask about non visited sites  exclusions can be set      If you enter a new SSL protected site  with an unknown  certificate   an action selection dialog is displayed  This mode allows you to create a list of SSL certificates that will  be excluded from scanning     Do not scan SSL protocol     If selected  the program will not scan communications over SSL     Apply created exceptions based on certificates     Activates using exclusions specified in excluded and trusted  cer
62. 4 2 1 1 Learning mode    The Learning mode feature in ESET Smart Security s Personal firewall automatically creates and saves a rule for each  communication that has been established in the system  No user interaction is required  because ESET Smart  Security saves rules according to the predefined parameters     This mode is not safe  and is recommended only for initial configuration of the Personal firewall     Activate Learning mode in Setup  gt  Network  gt  Personal Firewall  gt  Learning mode to display Learning mode options   This section includes the following items     Warning  While in Learning mode  the Personal firewall does not filter communication  All outgoing and incoming  communications are allowed  In this mode  your computer is not fully protected by the Personal firewall     Communication type     Select individual principles of rule creation for each type of communication  There exist four  types of communication       Inbound traffic from the Trusted zone     An example of an incoming connection within the trusted zone would  be aremote computer from within the trusted zone attempting to establish communication with a local  application running on your computer      Outbound traffic to the Trusted zone     A local application attempting to establish a connection to another  computer within the local network  or within a network in the trusted zone    e Inbound Internet traffic     A remote computer attempting to communicate with an application running on
63. 96  10 10 1 108 1  V   Network adapter type    C  Virtual adapter  VPN  tunnel         Physical network adapter  Wireless connection settings  When wireless SSID is  When connection profile is   When connection is secured   General settings for all adapters  applicable for multiple network adapters    Only one connection is active No wireless connection is established  No unsecured wireless connection is  established          4 2 4 1 2 Zone authentication   Server configuration    The authentication process can be executed by any computer server connected to the network that is to be  authenticated  The ESET Authentication Server application needs to be installed on a computer server that is  always accessible for authentication whenever a client attempts to connect to the network  The installation file for  the ESET Authentication Server application is available for download on ESET s website     After you install the ESET Authentication Server application  a dialog window will appear  you can access the  application by clicking Start  gt  Programs  gt  ESET  gt  ESET Authentication Server      To configure the authentication server  enter the authentication zone name  the server listening port  default is 80   as well as the location to store the public and private key pair  Next  generate the public and private key that will be  used in the authentication process  The private key will remain on the server while the public key needs to be  imported on the client side in the
64. A  user sharing any folder or directory within the LAN most likely uses this file sharing protocol     Within local network communication  password hashes are exchanged     SMB Relay receives a connection on UDP port 139 and 445  relays the packets exchanged by the client and server   and modifies them  After connecting and authenticating  the client is disconnected  SMB Relay creates a new virtual  IP address  The new address can be accessed using the command    net use W192 168 1 1   The address can then be  used by any of the Windows networking functions  SMB Relay relays SMB protocol communication except for  negotiation and authentication  Remote attackers can use the IP address  as long as the client computer is  connected     SMB Relay 2 works on the same principle as SMB Relay  except it uses NetBIOS names rather than IP addresses  Both  can carry out    man in the middle    attacks  These attacks allow remote attackers to read  insert and modify  messages exchanged between two communication endpoints without being noticed  Computers exposed to such  attacks often stop responding or restart unexpectedly     115    To avoid attacks  we recommend that you use authentication passwords or keys     6 2 7 ICMP attacks    The ICMP  Internet Control Message Protocol  is a popular and widely used Internet protocol  It is used primarily by  networked computers to send various error messages     Remote attackers attempt to exploit the weaknesses of the ICMP protocol  The ICMP pr
65. After you accept  installation will continue     For more instructions about installation steps  ESET Live Grid and Detection of potentially unwanted applications   follow the instructions in the aforementioned section  see  Live installer          qi Setup ESET Smart Security ncs   Detection of potentially unwa ap  tions    oy       ESET can detect potentially unwanted applications and ask for confirmation  before they install     Potentially unwanted applications might not pose security risk but they can affect computer s  performance  speed and reliability  or cause changes in behavior  They usually require user s  consent before installation     Pick an option before you continue      Enable detection of potentially unwanted applications     Disable detection of potentially unwanted applications                Installation mode provides configuration options appropriate for most users  These settings provide excellent  security  easy setup and high system performance  Advanced settings are designed for users who have experience  with fine tuning programs and who wish to modify advanced settings during installation  Click Install to start the  installation process and to bypass Advanced settings     2 2 1 Advanced settings    After selecting Advanced settings  you will be prompted to select a location for the installation  By default  the  program installs to the following directory     C  Program Files ESET ESET Smart Security    Click Browse    to change this location  n
66. ECURITY v     lt d Setup Computer              4S Home           Real time file system protection   Enabled    Configure      Q pU Edit exclusions        Update HIPS   Enabled    Configure      Ee  Setup  Anti Theft Disabled     x Tools f  Gamer mode Disabled    Confi     v Help and support i  Anti Stealth protection   Enabled    Configure       Ee   Temporarily disable Antivirus and antispyware protection  3 Computer scan setup          Temporarily disable Antivirus and antispyware protection     Disables all antivirus and antispyware protection  modules  When you disable protection  the Temporary disable protection window will open  allowing you to  determine how long protection is disabled by selecting a value from the Time interval drop down menu   Click OK  to confirm     Computer scan setup        Click to adjust the parameters of the on demand scanner  manually executed scan      19    4 1 1 Antivirus and antispyware    Antivirus and antispyware protection guards against malicious system attacks by controlling file  email and Internet  communication  If a threat with malicious code is detected  the Antivirus module can eliminate it by first blocking it  and then cleaning  deleting or moving it to quarantine     Scanner options for all protection modules  e g  Real time file system protection  Web access protection       allow  you to enable or disable detection of the following       Potentially unwanted applications  PUAs  are not necessarily intended to be malicious 
67. ESET SMART SECURITY 7    User Guide     intended for product version 7 0 and higher   Microsoft   Windows   8 1 8 7  Vista   XP   Home Server 2003   Home Server 2011    Click here to download the most recent version of this document    ESET SMART SECURITY    Copyright   2014 by ESET  spol  s r  o    ESET Smart Security was developed by ESET  spol s r  o    For more information visit www eset com    All rights reserved  No part of this documentation may be reproduced  stored in a  retrieval system or transmitted in any form or by any means  electronic  mechanical   photocopying  recording  scanning  or otherwise without permission in writing from  the author    ESET  spol s r  o  reserves the right to change any of the described application  software without prior notice     Worldwide Customer Support  www eset com support    REV  5 13 2014    Contents    1     1 1  1 2  1 3    2     2 1  2 2    2 3  2 4  2 5  2 6    3     3 1  3 2  3 3  3 4  3 5    4     4 1    ESET Smart SQCUIILY scsi senscscccssdacsscasssascsntiecerD    What s new in version 7      scscssssssssssssssssssssscscesesseesesserssesessecenee 6  System requirements                     eese eeeeeeee ee enetn este anenatn sns 6  PRO LAIT E A A E EA 7  installati Miosina sonnn        Live inst alle tiscsssecssccccssaccessecsaccessccctsseecessocssacsscerecasscessseseeceocosccnseacs 8  Offline installation             9  2 21 Advanced settinBs       2 oce epe e rere dae ceno 10  Product activation            5  3 o itr
68. P  HTTP      Anti Phishing protection allows you to block web pages known to distribute phishing content  We strongly  recommend that you leave Anti Phishing enabled     Antispam protection filters unsolicited email messages     User s Whitelist     Opens a dialog window where you can add  edit or delete email addresses that are considered  safe  Email messages received from addresses listed in the Whitelist will not be scanned for spam    User s Blacklist   Opens a dialog window where you can add  edit or delete email addresses that are considered  unsafe  Email messages received from addresses listed in the Blacklist will be assessed as spam    User s Exceptions list   Opens a dialog window where you can add  edit or delete email addresses that may be  spoofed and used for sending spam  Email messages received from addresses listed in the Exception list will  always be scanned for spam  By default  the Exception list contains all email addresses from existing email client  accounts     You can disable the web email anti phishing antispam protection module temporarily by clicking Enabled     51    4 3 1 Email client protection    Email protection provides control of email communication received through the POP3 and IMAP protocols  Using  the plug in for Microsoft Outlook and other e mail clients  ESET Smart Security provides control of all  communications from the email client  POP3  MAPI  IMAP  HTTP   When examining incoming messages  the  program uses all the advanced scan
69. S  i i LES Email dients    Move messages to spam folder  i Email dient integration     Use the folder   l IMAP  IMAPS n    POP3  POP3S     Mark spam messages as read  i Antispam protection  V  Mark reclassified messages as unread    Protocol filtering Spam score logging  f Anti Phishing protection      H  Parental control mE  H Q Update    Write only redassified messages and messages marked as SPAM  H 2 Tools    Write all messages   lll User interface          V  Start email dient antispam protection automatically  Allow advanced antispam scan                            Q  Search  CS   Cancel    Default               One important principle for spam detection is the ability to recognize unsolicited email based on predefined  trusted addresses  whitelist  and spam addresses  blacklist   All addresses from your contact list are automatically  added to the whitelist  as well as all other addresses you mark as safe     The primary method used to detect spam is the scanning of email message properties  Received messages are  scanned for basic Antispam criteria  message definitions  statistical heuristics  recognizing algorithms and other  unique methods  and the resulting index value determines whether a message is spam or not     Antispam protection in ESET Smart Security allows you to set different parameters to work with mailing lists   Options are as follows     Message processing    Add text to email subject     Enables you to add a custom prefix string to the subject line of
70. Sense engine  parameter setup section   Real time file system protection can be configured to treat newly created files  differently than existing files  For example  you can configure Real time file system protection to more closely  monitor newly created files     To ensure a minimal system footprint when using real time protection  files that have already been scanned are not  scanned repeatedly  unless they have been modified   Files are scanned again immediately after each virus  signature database update  This behavior is configured using Smart optimization  If this feature is disabled  all files  are scanned each time they are accessed  To modify this option  press F5 to open the Advanced setup window and  expand Computer    Antivirus and antispyware    Real time file system protection  Click Setup    next to ThreatSense  engine parameter setup    Other and select or deselect Enable Smart optimization     By default  Real time file system protection launches at system startup and provides uninterrupted scanning  In  special cases  for example  if there is a conflict with another real time scanner   real time protection can be  disabled by deselecting Start Real time file system protection automatically in the Real time file system protection  section of Advanced setup     20                                                                                     Advanced setup Gaer     Computer Real time file system protection   B E Antivirus and antispyware ThreatSense eng
71. Setup    in the Trusted zone section to display the Trusted zone setup window  Do not display dialog with  Trusted zone settings    allows the user to disable the trusted zone setup window each time the presence of a new  subnet is detected  The currently specified zone configuration is automatically used     NOTE  If the Personal firewall is set to Automatic mode  some settings are not available     Click Setup    in the Zone and rule editor section to display the Zone setup window  where an overview of either  rules or zones is displayed  based on the currently selected tab   The window is divided into two sections  The  upper section lists all rules in a shortened view  The lower section displays details about the rule currently selected  in the upper section  The bottom of the window has New  Edit  and Delete  Del  buttons  which allow you to  configure rules     Connections can be divided into incoming and outgoing connections  Incoming connections are initiated by a  remote computer attempting to establish a connection with the local system  Outgoing connections work in the  opposite way    the local system contacts a remote computer     If anew unknown communication is detected  you must carefully consider whether to allow or deny it  Unsolicited   unsecured or unknown connections pose a security risk to the system  If such a connection is established  we  recommend that you pay particular attention to the remote computer and the application attempting to connect to  y
72. add a URL address to the List of addresses excluded from filtering  the address will be excluded from  scanning  You can also allow or block certain addresses by adding them to the List of allowed addresses or List of  blocked addresses  Click Lists     to open the HTTP address mask lists window where you can Add or Remove lists of  addresses  In order to add an HTTPS URL addresses to the list  Always scan SSL protocol must be selected     In all lists  the special symbols    asterisk  and    question mark  can be used  The asterisk substitutes any character  string  and the question mark substitutes any symbol  Particular care should be taken when specifying excluded  addresses  because the list should only contain trusted and safe addresses  Similarly  itis necessary to ensure that  the symbols   and   are used correctly in this list  To activate a list  select the List active option  If you want to be  notified when entering an address from the current list  select Notify when applying address from the list              6 4 Web and email  B E Email dient protection    EES Web access protection  MEM HTTP  HTTPS  URL address management   E Protocol filtering   E Exduded applications   E Exduded IP addresses  i BEPSSL  Pod Anti Phishing protection  H  Parental control  H Q Update  B X Tools  H B User interface              e     2   fmt  Advanced setup  Jl Computer URL address management  E  Network Using URL address mask lists  you can specify which addresses will be blocked
73. alarms     Advanced heuristics DNA Smart signatures     Advanced Heuristics is one of the technologies used by ESET Smart  Security to provide proactive threat detection  It provides the ability to detect unknown malware based on its  functionality through emulation  This new binary translator helps bypass anti emulation tricks used by malware    29    writers  Its latest version introduces a completely new way of code emulation based on binary translation  This new  binary translator helps to bypass anti emulation tricks used by malware writers  In addition to these improvements   DNA based scanning has been significantly updated to allow for better generic detections and address current  malware more accurately     ESET Live Grid     Using ESET reputation technology  information about scanned files is verified against data from the  cloud based ESET Live Grid to improve detection and scanning speed     4 1 1 6 3 Cleaning    The cleaning settings determine the behavior of the scanner while cleaning infected files  There are 3 levels of  cleaning     4 1 1 6 4 Extensions    An extension is a part of a file name delimited by a period  An extension defines the type and content of a file  This  section of the ThreatSense parameter setup lets you define the types of files to scan     By default  all files are scanned regardless of their extension  Any extension can be added to the list of files  excluded from scanning  If Scan all files is deselected  the list changes to show all
74. all other vendors   Ctrl 3 displays full detail   Ctrl 2 displays medium detail   Ctrl 1 basic display   BackSpace moves one step back   Space moves one step forward   Ctrl W expands tree   Ctrl Q collapses tree    Other controls    Ctrl T goes to the original location of item after selecting in search results  Ctrl P displays basic information about an item   Ctrl A displays full information about an item   Ctrl C copies the current item s tree   Ctrl X copies items   Ctrl B finds information about selected files on the Internet  Ctrl L opens the folder where the selected file is located  Ctrl R opens the corresponding entry in the registry editor  Ctrl Z copies a path to a file  if the item is related to a file   Ctrl F switches to the search field   Ctrl D closes search results   CtrI E run service script    98    Comparing    Ctrl Alt O opens original   comparative log   Ctrl AIt R cancels comparison   Ctrl Alt 1 displays all items   Ctrl Alt 2 displays only added items  log will show items present in current log  Ctrl Alt 3 displays only removed items  log will show items present in previous log  Ctrl Alt 4 displays only replaced items  files inclusive    Ctrl Alt 5 displays only differences between logs   Ctrl Alt C displays comparison   Ctrl Alt N displays current log   Ctrl Alt P opens previous log    Miscellaneous    F1 view help   Alt F4 close program   Alt Shift F4 close program without asking  Ctrl I log statistics    5 6 2 3 Compare    The Compare feature allows 
75. analysis of this data can help detect attempts to compromise system security  Many other factors  indicate potential security risks and allow you to minimize their impact  frequent connections from unknown  locations  multiple attempts to establish connections  unknown applications communicating or unusual port  numbers used     4 2 7 System integration    The ESET Smart Security Personal firewall can operate at several levels       All features active     The Personal firewall is fully integrated and its components are active by default  If your  computer is connected to alarge network  or to the internet  we recommend that you leave this option enabled   This is the most secure Personal firewall setting and offers a high level of protection      Personal firewall is inactive     The Personal firewall is integrated in the system and mediates network  communication but does not check for threats      Only scan application protocols     Only components of the Personal firewall that provide scanning of application  protocols  HTTP  POP3  IMAP and their secured versions  are active  If the application protocols are not scanned   protection is carried out at the level of real time file system protection and on demand computer scan      Personal firewall is completely disabled     Select this option to completely disengage the Personal firewall  No  scanning is performed  This can be useful when testing     if an application is blocked  you can check to see if it is  blocked by th
76. are products through the use of obfuscation  and or encryption     Firewall improvements     In the new version of ESET Smart Security  you can adjust and manage IDS exceptions  and the temporary IP address blacklist  The IDS detection notification system is now more user friendly and  informative     Anti phishing improvements     ESET Smart Security now blocks scam sites as well as phishing sites  Improved  submission of suspicious sites and false positive sites by users     Specialized cleaner     A bundle of the top 3 5 most prevalent critical malware threats     Faster and more reliable installation     Including an initial scan which runs automatically 20 minutes after  installation or reboot     Mail plugin compatibility     Our plugin now integrates with Office 2013 and Windows Live Mail     Improved compatibility in Windows 8 8 1     ESET SysRescue is now fully functional on Windows 8  Toast  notifications are now shown in the Windows 8 environment  notifying you of HIPS detections or file detections  that require user interaction or downloads of potentially unwanted applications     For more details about new features in ESET Smart Security please read the following ESET Knowledgebase article   What s new in ESET Smart Security 7 and ESET NOD32 Antivirus 7     1 2 System requirements    For seamless operation of ESET Smart Security  your system should meet the following hardware and software  requirements     Microsoft  Windows  XP  SP3     600 MHz 32 bit  x86    64
77. at contains information about the executable file processed  If the relevant CAT file is found   the digital signature of that CAT file will be applied in the validation process of the executable     This is why there are sometimes files marked as  Signed by MS   but having a different  CompanyName  entry   Example     Windows 2000 includes the HyperTerminal application located in C  Program Files Windows NT  The main  application executable file is not digitally signed  but ESET SysInspector marks it as a file signed by Microsoft  The  reason for this is a reference in C  WINNT system32 CatRoot  F750E6C3 38EE 11D1 85E5 OO0CO4FC295EE  sp4 cat  pointing to C  Program Files Windows NT hypertrm exe  the main executable of the HyperTerminal application   and sp4 cat is digitally signed by Microsoft     105    5 6 6 ESET Sysinspector as part of ESET Smart Security    To open the ESET SysInspector section in ESET Smart Security  click Tools  gt  ESET SysInspector  The management  system in the ESET SysInspector window is similar to that of computer scan logs  or scheduled tasks  All operations  with system snapshots     create  view  compare  remove and export     are accessible within one or two clicks     The ESET SysInspector window contains basicinformation about the created snapshots such as create time  a short  comment  name of the user that created the snapshot and snapshot status     To compare  create  or delete snapshots  use the corresponding buttons located below the l
78. ating system is running  etc     5 7 1 Minimum requirements    ESET SysRescue works in the Microsoft Windows Preinstallation Environment  Windows PE  version 2 x  which is  based on Windows Vista     Windows PE is part of the free Windows Automated Installation Kit  Windows AIK  or Windows Assesment and  Deployment Kit  WADK  and therefore Windows AIK or WADK must be installed before creating ESET SysRescue     http   go eset eu AIK  http   www microsoft com en us download details aspx id 30652   Choosing between    these kits depends on operating system version  Due to the support of the 32 bit version of Windows PE  itis  necessary to use a 32 bit installation package of ESET Security solution when creating ESET SysRescue on 64 bit  systems  ESET SysRescue supports Windows AIK 1 1 and higher as well as WADK 1 0 and higher     When installing Windows ADK choose only packages Deployment Tools and Windows Preinstallation Enviroment   Windows PE  to install  Since these packages over 3 0 GB in size  a high speed internet connection is recommended  to download     ESET SysRescue is available in ESET Security solutions version 4 0 and higher     Windows ADK supports     e Windows 8   e Windows 7   e Windows Vista   e Windows Vista Service Pack 1  e Windows Vista Service Pack 2    Note  ESET SysRescue may not be available for Windows 8 in older versions of ESET security products  In this case  we recommend that you upgrade your product or create an ESET SysRescue disk on another v
79. ation  This  option allows you to limit the number of rules that can be created for one application  This option is active when  Add remote port is enabled     Notify about learning mode expiration in X days     Specifies the number of days after which ESET Smart Security will  notify the user that Learning mode is still active  This option is intended to prevent the user from operating the  Personal firewall in Learning mode for an extended period of time  We recommend switching the Personal firewall  to Learning mode only for a short time  while the user initiates typical connections  Network communications which  are saved during the Learning mode period can be used as the foundation for a permanent set of rules     41    4 2 2 Firewall profiles    Profiles can be used to control the behavior of the ESET Smart Security Personal firewall  When creating or editing a  Personal firewall rule  you can assign it to a specific profile or have it apply to every profile  When you selecta  profile  only the global rules  rules with no profile specified  and the rules that have been assigned to that profile  are applied  You can create multiple profiles with different rules assigned to easily alter the Personal firewall  behavior     Click Profiles     see figure in section Filtering modes  to open the Firewall profiles window where you can Add  Edit  or Remove profiles  Note that in order to Edit or Remove a profile  it must not be selected from the Selected profile  drop down menu 
80. box content change if you are experiencing a system  slowdown when working with your email client  This can occur when retrieving email from the Kerio Outlook  Connector Store     Even if integration is not enabled  email communication is still protected by the email client protection module   POP3  IMAP      52    4 3 1 1 1 Email client protection configuration    The Email client protection module supports the following email clients  Microsoft Outlook  Outlook Express   Windows Mail  Windows Live Mail and Mozilla Thunderbird  Email protection works as a plug in for these programs   The main advantage of the plug in is that it is independent of the protocol used  When the email client receives an  encrypted message  it is decrypted and sent to the virus scanner     Email to scan    Received email     Toggles checking of received messages   Sent email     Toggles checking of sent messages   Read email     Toggles checking of read messages     Action to be performed on infected email    No action     If enabled  the program will identify infected attachments  but will leave emails without taking any  action    Delete email     The program will notify the user about infiltration s  and delete the message    Move email to the Deleted items folder     Infected emails will be moved automatically to the Deleted items folder   Move email to folder     Specify the custom folder where you want to move infected emails when detected     Other    Repeat scan after update     Toggles res
81. can be customized to fit your needs     If you choose not to display some notifications  they will be displayed in the Hidden notification windows area   Here you can check their status  show more details or remove them from this window     To provide maximum security of your security software  you can prevent any unauthorized changes by protecting  the settings by a password using the Access setup tool     88    The Context menu is displayed after right clicking an object  Use this tool to integrate ESET Smart Security control  elements into the context menu     4 7 1 Graphics    User interface configuration options in ESET Smart Security allow you to adjust the working environment to fit your  needs  These configuration options are accessible in the Advanced setup tree by expanding User interface and  clicking Graphics     In the User interface elements section  the Graphical user interface option should be disabled if the graphical  elements slow the performance of your computer or cause other problems  The graphical interface may also need  to be turned off for visually impaired users  as it may conflict with special applications that are used for reading text  displayed on the screen     If you want to deactivate the ESET Smart Security splash screen  deselect Show splash screen at startup     Enable Select active control element to cause the system to highlight any element which is currently under the  active area of the mouse cursor  The highlighted element will be act
82. canning after a virus signature database update   Accept scan results from other modules   If this is selected  the email protection module accepts scan results of  other protection modules     4 3 1 2 IMAP  IMAPS scanner    The Internet Message Access Protocol  IMAP  is another Internet protocol for email retrieval  IMAP has some  advantages over POP3  for example  multiple clients can simultaneously connect to the same mailbox and maintain  message state information such as whether or not the message has been read  replied to or deleted  ESET Smart  Security provides protection for this protocol regardless of the email client used     The protection module providing this control is automatically initiated at system startup and is then active in  memory  IMAP protocol control is performed automatically without the need to reconfigure the email client  By  default  all communication on port 143 is scanned  but other communication ports can be added if necessary   Multiple port numbers must be delimited by a comma     Encrypted communication will be not scanned  To enable the scanning of encrypted communication and view the  scanner setup  navigate to SSL protocol checking in Advanced setup section  click Web and email    Protocol filtering     SSL and enable the Always scan SSL protocol option     53                                               2   EN  Advanced setup Ger  ll Computer IMAP IMAPS scanner  a  Network IMAP scanner setup  EB Web and email T  Enat ea  B E Email di
83. cation present and running on your computer  and you did not  install it   please consult your network administrator or remove the application     6 1 9 Potentially unwanted applications    Potentially unwanted applications  PUAs  are not necessarily intended to be malicious  but may affect the  performance of your computer in a negative way  Such applications usually require consent before installation  If  they are present on your computer  your system behaves differently  compared to the state before their  installation   The most significant changes are       New windows you haven t seen previously  pop ups  ads    Activating and running of hidden processes    Increased usage of system resources    e Changes in search results      Application communicates with remote servers     6 2 Types of remote attacks    There are many special techniques which allow attackers to compromise remote systems  These are divided into  several categories     6 2 1 DoS attacks    DoS  or Denial of Service  is an attempt to make a computer or network unavailable for its intended users  The  communication between afflicted users is obstructed and can no longer continue in a functional way  Computers  exposed to DoS attacks usually need to be restarted in order to work properly     In most cases  the targets are web servers and the aim is to make them unavailable to users for a certain period of  time     6 2 2 DNS Poisoning    Using DNS  Domain Name Server  poisoning  hackers can trick the DNS
84. cified time interval     System information    Contains detailed information about hardware and software along with information about set environmental  variables  user rights and system event logs     File details    A list of important system files and files in the Program Files folder  Additional information specific for the files can  be found in the Description and Details windows     About    Information about version of ESET SysInspector and the list of program modules     97    5 6 2 2 1 Keyboard shortcuts    Key shortcuts that can be used when working with the ESET SysInspector include     File   Ctrl O opens existing log   Ctrl S saves created logs   Generate   Ctrl G generates astandard computer status snapshot  Ctrl H generates a computer status snapshot that may also log sensitive information  Item Filtering   1 0 fine  risk level 1 9 items are displayed   2 fine  risk level 2 9 items are displayed   3 fine  risk level 3 9 items are displayed   4  U unknown  risk level 4 9 items are displayed  5 unknown  risk level 5 9 items are displayed  6 unknown  risk level 6 9 items are displayed  7 B risky  risk level 7 9 items are displayed   8 risky  risk level 8 9 items are displayed   9 risky  risk level 9 items are displayed     decreases risk level     increases risk level   Ctrl 9 filtering mode  equal level or higher   Ctrl 0 filtering mode  equal level only   View   Ctrl 5 view by vendor  all vendors   Ctrl 6 view by vendor  only Microsoft   Ctrl 7 view by vendor  
85. col used for the rule  Click Select protocol    to open the Protocol selection  window     All rules are enabled For every profile by default  Alternatively  select a custom firewall profile using the Profiles     button     If you click Log  the activity connected with the rule will be recorded in alog  Notify user displays a notification  when the rule is applied     At the bottom of all three tabs is a summary of the rule  You will see the same information if you click the rule in  the main window  Tools    Network connections  right click the rule and select Show details  see chapter Network  connections       When creating a new rule  you have to enter a name forthe rule into the Name field  Select the direction to which  the rule applies from the Direction drop down menu  Select the action to be executed when a communication  meets the rule from the Action drop down menu     A good example of adding a new rule is allowing your Internet browser to access the network  In this example  the  following must be configured        n the General tab  enable outgoing communication via the TCP and UDP protocol   e Add the process representing your browser application  for Internet Explorer it is iexplore exe  in the Local tab      n the Remote tab  enable port number 80 only if you wish to allow standard Internet browsing activities     4 2 4 Configuring zones  In the Zone setup window you can specify the zone name  description  network address list and zone  authentication  see a
86. configuration file you want to import     The steps to export a configuration are very similar  In the main program window  click Setup  gt  Import and export  settings     Select Export settings and enter the file name of the configuration file  i e  export xml   Use the browser  to select a location on your computer to save the configuration file     Note  You may encounter an error while exporting settings if you do not have enough rights to write the exported  file to specified directory        The current configuration of ESET Smart Security can be saved to an XML  file and restored at a later time when needed     Import and export             93    5 5 Idle state detection    Idle state detection settings can be configured in Advanced setup under Tools  gt  Idle state detection  These settings  specify a trigger for Idle state scanning  when       the screen saver is running     the computer is locked     auser logs off     Use the check boxes for each respective state to enable or disable the different idle state detection triggers     5 6 ESET SysInspector    5 6 1 Introduction to ESET Sysinspector    ESET SysInspector is an application that thoroughly inspects your computer and displays gathered data in a  comprehensive way  Information like installed drivers and applications  network connections or important registry  entries can help you to investigate suspicious system behavior be it due to software or hardware incompatibility or  malware infection     You can acc
87. created    Deletion enabled     Enables you to select fast erasing and complete erasing    Burning device     Select the drive to be used for burning    Warning  This is the default option  If a rewritable CD DVD is used  all the data on the CD DVD will be erased    The Medium section contains information about the medium in your CD DVD device     Burning speed    Select the desired speed from the drop down menu  The capabilities of your burning device and  the type of CD DVD used should be considered when selecting the burning speed     5 7 5 Working with ESET SysRescue    For the rescue CD DVD USB to work effectively  you must start your computer from the ESET SysRescue boot media   Boot priority can be modified in the BIOS  Alternatively  you can use the boot menu during computer startup      usually using one of the F9  F12 keys depending on the version of your motherboard BIOS     After booting up from the boot media  ESET Security solution will start  Since ESET SysRescue is used only in specific  situations  some protection modules and program features present in the standard version of ESET Security  solution are not needed  their list is narrowed down to Computer scan  Update  and some sections in Setup and  Tools  The ability to update the virus signature database is the most important feature of ESET SysRescue  we  recommend that you update the program prior starting a Computer scan     109    5 7 5 1 Using ESET SysRescue    Suppose that computers in the network ha
88. cting If necessary   restart computer without notifying     The next installation window offers the option to set a password to protect your program settings  Select Protect  configuration settings with a password and enter your password into the the New password and Confirm new  password fields  This password will be required to change or access the settings of ESET Smart Security  When both  password fields match  click Next to continue     To complete the next installation steps  ESET Live Grid and Detection of potentially unwanted applications  follow  the instructions in the Live installer section  see  Live installer       Next  select a filtering mode for the ESET Personal firewall  Four filtering modes are available for the ESET Smart  Security Personal firewall  The behavior of the firewall changes based on the selected mode  Filtering modes also  influences the level of user interaction required     To disable the first scan after installation that is normally performed when installation finishes to check for  malicious code  deselect the check box next to Enable scan after installation  Click Install in the Ready to install  window to complete installation     2 3 Product activation    After the installation is complete  you will be prompted to activate your product     There are several methods for activating your product  Availability of a particular activation scenario in the  activation window may vary depending on the country  as well as the means of distribut
89. ction    To verify that real time protection is working and detecting viruses  use a test file from eicar com  This test file is a   harmless file detectable by all antivirus programs  The file was created by the EICAR company  European Institute   for Computer Antivirus Research  to test the functionality of antivirus programs  The file is available for download  www eicar org download eicar com    NOTE  Before performing a real time protection check  it is necessary to disable the firewall  If the firewall is  enabled  it will detect the file and prevent test files from downloading     4 1 1 1 5 What to do if real time protection does not work    In this chapter  we describe problems that may arise when using real time protection and how to troubleshoot  them     Real time protection is disabled    If real time protection was inadvertently disabled by a user  it needs to be reactivated  To reactivate real time  protection  navigate to Setup in the main program window and click Real time file system protection     If real time protection is not initiated at system startup  it is usually because Start Real time file system protection  automatically is deselected  To enable this option  navigate to Advanced setup  F5  and click Computer  gt  Antivirus  and antispyware  gt  Real time file system protection in the Advanced setup tree  In the Advanced setup section at  the bottom of the window  make sure that the Start Real time file system protection automatically check box is  
90. ction permanently is possible in the advanced    setup     Block network     Personal firewall will block all outgoing   incoming network and internet traffic              Temporarily disable firewall     Switches the firewall to an inactive state  See the chapter System integration of  Personal firewall for more information     Advanced setup        Select this option to enter the Advanced setup tree  There are also other ways to open  Advanced setup  such as pressing the F5 key or navigating to Setup    Enter advanced setup        Log files     Log files contain information about important program events that have occurred and provide an  overview of detected threats     Reset window layout     Resets the ESET Smart Security s window to its default size and position on the screen     Activate your product        Select this option if you have not yet activated your ESET security product  orto reenter  product activation credentials after renewing your license     About   Provides system information  details about the installed version of ESET Smart Security and the installed  program modules  Here you can also find the license expiration date and information about the operating system  and system resources     4 7 6 Context menu    The context menu is displayed after right clicking an object  The menu lists all of the actions that you can perform  on an object     It is possible to integrate ESET Smart Security control elements into the context menu  More detailed setup opt
91. ctivity  Based on these heuristics  objects are assigned a risk level from 1     Fine  green  to 9     Risky  red      NOTE  Known applications marked as Fine  green  are definitely clean  whitelisted  and will be excluded from  scanning  as this will improve the scanning speed of on demand computer scan or Real time file system protection  on your computer     Number of users     The number of users that use a given application  This information is gathered by ESET Live Grid  technology     Time of discovery     Period of time since the application was discovered by ESET Live Grid technology     NOTE  When an application is marked as Unknown  orange  security level  it is not necessarily malicious software   Usually it is just a newer application  If you are not sure about the file  you can submit file for analysis to the ESET  Virus Lab  If the file turns out to be a malicious application  its detection will be added to one of the upcoming  updates     Application name     The given name of a program or process     Open in a new window   The running processes information will be opened in a new window     82    By clicking a given application at the bottom  the following information will appear at the bottom of the window       File     Location of an application on your computer    File size    File size in B  bytes     File description     File characteristics based on the description from the operating system   Company name     Name of the vendor or application process  
92. d Windows Server 2008  the new Windows Filtering  Platform  WFP  architecture is used to check network communication  Since the WFP technology uses special  monitoring techniques  the following options are not available     HTTP  POP3 and IMAP ports     Limits routing the traffic to the internal proxy server only for the corresponding  ports    Applications marked as web browsers and email clients     Limits routing the trafficto the internal proxy server  only for the applications marked as browsers and email clients  Web and email  gt  Protocol filtering  gt  Web and  email clients     Ports and applications marked as web browsers or email clients     Enables routing of all traffic on the  corresponding ports as well as all the communication of the applications marked as browsers and email clients on  the internal proxy server     4 3 3 1 Web and email clients    NOTE  Starting with Windows Vista Service Pack 1 and Windows Server 2008  the new Windows Filtering Platform   WFP  architecture is used to check network communication  Since WFP technology uses special monitoring  techniques  the Web and email clients section is not available     Because of the enormous amount of malicious code circulating the Internet  safe Internet browsing is a very  important aspect of computer protection  Web browser vulnerabilities and fraudulent links help malicious code  enter the system unnoticed which is why ESET Smart Security focuses on web browser security  Each application  accessing
93. d is 14 days  After this time period is over  a pop   up window will open in which you can edit the rules and select a different filtering mode     The HIPS system monitors events inside the operating system and reacts accordingly based on rules similar to the  rules used by the personal firewall in ESET Smart Security  Click Configure rules    to open the HIPS rule  management window  Here you can select  create  edit or delete rules     In the following example  we will demonstrate how to restrict unwanted behavior of applications     36    1  Name the rule and select Block from the Action drop down menu   2  Open the Target applications tab  Leave the Source applications tab blank to apply your new rule to all    applications attempting to perform any of the selected operations in the Operations list on applications in the    Over these applications list     3  Select Modify state of another application  all operations are described in product help  which can be accessed    by pressing F1    4  Add one or several applications you wish to protect   5  Select the Notify user check box to display a notification any time that a rule is applied   6  Click OK to save the new rule                                                                                                                    Rules define how the Host based Intrusion Prevention System decides which applications have allowed or blocked access to selected files  parts of  registry or other applications  It is also
94. d modules from FOLDER   quarantine FOLDER   exclude files matching MASK from scanning  scan subfolders  default    do not scan subfolders   maximum sub level of folders within folders to scan  follow symbolic links  default    skip symbolic links   scan ADS  default    do not scan ADS   log output to FILE   overwrite output file  default     append   log output to console  default    do not log output to console   also log clean files   do not log clean files  default    show activity indicator   scan and automatically clean all local disks    scan files  default    do not scan files   scan memory   scan boot sectors   do not scan boot sectors  default    scan archives  default    do not scan archives   only scan files smaller than SIZE megabytes  default 0   unlimited    maximum sub level of archives within archives  nested archives  to scan   scan archives for LIMIT seconds at maximum   only scan the files in an archive if they are smaller than SIZE  default 0   unlimited   only scan the files in a self extracting archive if they are smaller than SIZE megabytes   default 0   unlimited    scan email files  default    do not scan email files   scan mailboxes  default      no mailbox    sfx    no sfx    rtp    no rtp    unsafe    no unsafe   unwanted   no unwanted   suspicious   no suspicious   pattern   no pattern    heur    no heur   adv heur   no adv heur   ext EXTENSIONS   ext exclude EXTENSIONS   clean mode MODE     quarantine     no quarantine    General options     help
95. d on additional device parameters that  can be specified in the rule configuration  The list of rules contains several descriptions of a rule such as name  type  of external device  action to perform after connecting an external device to your computer and log severity     Click Add or Edit to manage a rule  Click Copy to create a new rule with predefined options used for another  selected rule  XML strings displayed when clicking a rule can be copied to the clipboard to help system  administrators to export import these data and use them  for example in ESET Remote Administrator     By pressing CTRL and clicking  you can select multiple rules and apply actions  such as deleting or moving them up or  down the list  to all selected rules  The Enabled check box disables or enables a rule  this can be useful if you don t  wish to delete a rule permanently in case you wish to use itin the future     The control is accomplished by rules that are sorted in the order determining their priority  with higher priority  rules on top     You can right click a rule to display the context menu  Here you can set the log entries verbosity  severity  of a rule   Log entries can be viewed from the main window of ESET Smart Security in Tools  gt  Log files     Click Populate to auto populate removable media device parameters for devices connected to your computer     34    4 1 3 2 Adding Device control rules    A Device control rule defines the action that will be taken when a device meeting th
96. d to define rules  However  you can also add custom  user defined rules  Automatic mode  allows all outbound trafficfor the given system and blocks all new connections initiated from the network side     Interactive mode     Allows you to build a custom configuration for your Personal firewall  When a communication is  detected and no existing rules apply to that communication  a dialog window reporting an unknown connection will  be displayed  The dialog window gives the option of allowing or denying the communication  and the decision to  allow or deny can be remembered as a new rule for the Personal firewall  If you choose to create a new rule at this  time  all future connections of this type will be allowed or blocked according to the rule     Policy based mode   Blocks all connections which are not defined by a specific rule that allows them  This mode  allows advanced users to define rules that permit only desired and secure connections  All other unspecified  connections will be blocked by the Personal firewall     Learning mode     Automatically creates and saves rules  this mode is suitable for initial configuration of the Personal  firewall  No user interaction is required  because ESET Smart Security saves rules according to predefined  parameters  Learning mode is not secure  and should only be used until all rules for required communications have  been created     Profiles are a tool to control the behavior of the ESET Smart Security Personal firewall     40    
97. ddress   communication Port  plus Username and Password for the proxy server if required      The proxy server settings were not set globally  but ESET Smart Security will connect to a proxy server for updates    e Your computer is connected to the Internet via a proxy server  The settings are taken from Internet Explorer  during program installation  but if they are subsequently changed  e g  if you change your ISP   please check that  the HTTP proxy settings listed in this window are correct  Otherwise the program will not be able to connect to  the update servers     The default setting for the proxy server is Use global proxy server settings     NOTE  Authentication data such as Username and Password is intended for accessing the proxy server  Complete  these fields only if a username and password are required  Please note that these fields are not for your Username   Password for ESET Smart Security  and should only be completed if you know you need a password to access the  internet via a proxy server     4 5 1 2 3 Connecting to the LAN    When updating from a local server with an NT based operating system  authentication for each network connection  is required by default     To configure such an account  click the LAN tab  The Connect to LAN as section offers the System account  default    Current user  and Specified user options     Select the System account  default  option to use the system account for authentication  Normally  no  authentication process takes plac
98. e  subject   based filtering of infected emails  if supported by your email program   It also increases the level of credibility for  the recipient and if an infiltration is detected  provides valuable information about the threat level of a given email  or sender     Template added to the subject of infected email     Edit this template if you wish to modify the subject prefix format  of an infected email  This function will replace the message subject  Hello  with a given prefix value   virus   to the  following format    virus  Hello   The variable  V RUSNAME  represents the detected threat     4 3 1 1 Integration with email clients    Integration of ESET Smart Security with email clients increases the level of active protection against malicious code  in email messages  If your email client is supported  integration can be enabled in ESET Smart Security  When  integration is activated  the ESET Smart Security toolbar is inserted directly into the email client  allowing for more  efficient email protection  Integration settings are available through Setup    Enter advanced setup       Web and  email    Email client protection    Email client integration     Email clients that are currently supported include Microsoft Outlook  Outlook Express  Windows Mail  Windows Live  Mail and Mozilla Thunderbird  For a complete list of supported email clients and their versions  referto the    following ESET Knowledgebase article     Select the check box next to Disable checking upon in
99. e 109  5 7 5 1 Using ESET Sys ReSCU     soisscecesssssssiorsscsndssassesabesnconnsancs 110  Command Line                  eese eeeeeee te tetntataten tnn ta tentata nans 110    Gossau ie drop n POI ERRAT bbe           Types of infiltration                        eere ee eee eese teen teen enata tnus 112  6 1 1 PI In                         H   112  6 1 2 LTU                      HMM 112  6 1 3 TROJANS e                             112  6 1 4  oid                           M 113  6 1 5 Dur c                    113  6 1 6 SDVWall8   ciere cout ue doa ed eeu ve dco YR qc h dne ch eeu de da pues 113  6 1 7 Lc M             M  H  R 114  6 1 8 Potentially unsafe applications                     sssssssss 114  6 1 9 Potentially unwanted applications                              114  Types of remote attackS          cscssscsscscscsecscssscsesssscsssssseseserers 114  6 2 1 DoS attacks  tritt ies dr tent iR 114  6 2 2 DING POMS ONIN viscisscsiacsaciacaascdeiaaciasienaabcnesaedgaciasaassnasaeis 114  6 2 3 Worm attacks c 115  6 2 4 Port SEAM Bix e caus eqdua a aaa drag Pa RUE ERE EE 115  6 2 5 TCP desynchronization       noroeste pro cocer rh 115  6 2 6 SMB Relay         115  6 2 7 ICMP attacks    oie adress bd saa a beides hend io na sb bei edi inde 116  ESET Technology    retinerent co kept tins ati era nktens 116  6 3 1 Exploit BlOCKGE id ree o rode dni erdt 116  6 3 2 Advanced Memory Scanner                  eeeeeeeeeee 116  6 3 3 Vulnerability Shield    2 es ooo oo er inier 116  6 3
100. e BIOS versions may report  problems with the BIOS   boot manager communication  e g  on Windows Vista  and booting exits with the  following error message    file    boot bcd    status   0xc000000e  info   an error occurred while attemping to read the boot configuration data    If you encounter this message  we recommend selecting CD instead of USB medium     5 7 4 Settings    Before initiating ESET SysRescue creation  the install wizard displays compilation parameters  These can be  modified by clicking the Change    button  The available options include       Folders   e ESET Antivirus     Advanced      nternet protocol   e Bootable USB device  when the target USB device is selected     Burning  when the target CD DVD drive is selected        The Create option is inactive if no MSI installation package is specified  or if no ESET Security solution is installed on  the computer  To select an installation package  click Change and click the ESET Antivirus tab  Also  if you do not fill  in username and password  Change    ESET Antivirus   the Create option is greyed out     107    5 7 4 1 Folders    Temporary folder is a working directory for files required during ESET SysRescue compilation   ISO folder is a folder  where the resulting ISO file is saved after the compilation is completed     The list on this tab shows all local and mapped network drives together with the available free space  If some of the  folders here are located on a drive with insufficient free space  we
101. e action carried out while cleaning   do not copy infected files to Quarantine    show help and quit  show version information and quit  preserve last access timestamp    no threat found   threat found and cleaned   some files could not be scanned  may be threats   threat found   error    NOTE  Exit codes greater than 100 mean that the file was not scanned and thus can be infected     111    6  Glossary    6 1 Types of infiltration    An Infiltration is a piece of malicious software trying to enter and or damage a user   s computer     6 1 1 Viruses    A computer virus is a piece of malicious code that is pre pended or appended to existing files on your computer   Viruses are named after biological viruses because they use similar techniques to spread from one computer to  another  As for the term    virus     it is often used incorrectly to mean any type of athreat  This usage is gradually  being overcome and replaced with a more accurate term    malware     malicious software      Computer viruses mainly attack executable files and documents  In short  this is how a computer virus works  after  execution of an infected file  the malicious code is called and executed prior to the execution of the original  application  A virus can infect any files that the current user has write permissions for     Computer viruses can range in purpose and severity  Some of them are extremely dangerous because of their  ability to purposely delete files from a hard drive  On the other hand  
102. e firewall  This is the least secure option  use caution when disabling the firewall completely     Postpone Personal firewall module update until a computer restart     Personal firewall updates will only be  downloaded and installed following a computer restart     50    4 3 Web and email    Web and email configuration can be found in the Setup pane by clicking on Web and email  From here you can  access more detailed settings of the program        E JI    SMART SECURITY v     lt d Setup Web and email            4S Home         Web access protection 9 Enabled    Configure      o Computer scan  Email client protection   Enabled        Update Configure      He Setup Anti Phishing protection   Enabled    Configure      Tools       X Antispam protection 9 Enabled    Configure        s Help and support User s Whitelist    User s Blacklist  User s Exceptions list       Internet connectivity is a standard feature for personal computers  Unfortunately  the Internet has become the  primary medium for distributing malicious code  For this reason it is essential that you carefully consider your Web  access protection settings     Click Configure to open web email anti phishing antispam protection settings in Advanced setup     Email client protection provides control of email communications received through POP3 and IMAP protocol  Using  the plug in program for your email client  ESET Smart Security provides control of all communications to and from  your email client  POP3  MAPI  IMA
103. e if there is no authentication data supplied in the main update setup section     To ensure that the program authenticates using a currently logged in user account  select Current user  The  drawback of this option is that the program is not able to connect to the update server if no user is currently logged  in    Select Specified user if you want the program to use a specific user account for authentication  Use this method  when the default system account connection fails  Please be aware that the specified user account must have    access to the update files directory on the local server  Otherwise  the program will not be able to establish a  connection and download updates     Warning  When either Current user or Specified user is selected  an error may occur when changing the identity of  the program to the desired user  We recommend entering the LAN authentication data in the main update setup  section  In this update setup section  the authentication data should be entered as follows  domain nameYuser  if it  is a workgroup  enter workgroup_name name  and password  When updating from the HTTP version of the local  server  no authentication is required     Select Disconnect from server after update if connection to the server remains active even after updates have been  downloaded     73    4 5 2 Update rollback    If you suspect that a new update of the virus database and or program modules may be unstable or corrupt  you can  roll back to the previous version and d
104. e rires 80  4 6 6 1 SUSPICIOUS files    eere etie eie rena 81  4 6 7 Running processes       82  4 6 8 Network cornectlons      neenon dein rines 83  4 6 9 Quiairantilig    ccce de e tcr re enter ea eere to en e 85  4 6 10 Proxy server SOEUDuu eost opes iata ari pr ba Re toRP b PR PaL a 86  4 6 11 Alerts andinotifi cations    catre rete eredi peas 86  4 6 11 1   Message format    rn erre AERA c2s 87  4 6 12 Submission of samples for analysis                      ssusssss  88  4 6 13 Systemiupdates        2 iei census aaiae 88  User interface       4488  4 7 1 GRO MICS t 89  4 7 2 Alerts andnotificatiolis         eerie tnr irn 89  4 7 2 1 Advanced setup    ini rris Ene enn ede e euius 89  4 7 3 Hidden notification windows    90  4 7 4 Access Setpa iarna aio En Raa 90  4 7 5 Program MENU eC        90  4 7 6 Context MENU ieaie dE eee Ea EEE ERNS iS 91  Advanced user    cesar soin khan ah a da Pisas as 92  Profile manager    occorre teri bn era orae era honte assisa apa iiaae 92  Keyboard shortcuts                      eese eeeeeea sete tsn teta tnntntnans 92  P ET 4 pri pcHm dH  93  Import and export SettingsS         ses seseseeeseessressreosreoseesereseeeseeese 93  Idle state detection                      esses esee tntatentntntans 94  ESET SySINSPOCUOM                          94  5 6 1 Introduction to ESET SysInspector                  ssesseeeeee 94  5 6 1 1 Starting ESET SysInSpectOt    iies eese oomen rrt mer ar tnn 94  5 6 2 User Interface and application usage         
105. e rule criteria is connected to  the computer                          Rule Edito exe  Name Block USB for user  7  Enabled  Device Type  Disk Storage x  Rights   Block      Vendor  Games company  Inc   Model  basic    Serial Number  0x4322600934       User List        Any user or group                i mam          Enter a description of the rule into the Name field for better identification  Selecting the check box next to Enabled  disables or enables this rule  this can be useful if you don t wish to delete the rule permanently     Device type    Choose the external device type from the drop down menu  USB Bluetooth FireWire       The types of devices are  inherited from the operating system and can be seen in the system Device manager providing a device is connected  to the computer  The Optical storage device type in the drop down menu refers to the storage of data on an  optically readable medium  e g  CDs  DVDs   Storage devices cover external disks or conventional memory card  readers connected via USB or FireWire  Smart card readers encompass readers of smart cards with an embedded  integrated circuit  such as SIM cards or authentication cards  Examples of imaging devices are scanners or cameras   these devices do not provide information about users  only about their actions  This means that imaging devices can  only be blocked globally     Rights    Access to non storage devices can be either allowed or blocked  By contrast  rules for storage devices allow for  selec
106. e will then  scan only objects smaller than the size specified  This option should only be changed by advanced users who may  have specific reasons for excluding larger objects from scanning  Default value  unlimited     Maximum scan time for object  sec     Defines the maximum time value for scanning of an object  If a user defined  value has been entered here  the antivirus module will stop scanning an object when that time has elapsed   regardless of whether the scan has finished  Default value  unlimited     Archive nesting level     Specifies the maximum depth of archive scanning  Default value  10     Maximum size of file in archive     This option allows you to specify the maximum file size for files contained in  archives  when they are extracted  that are to be scanned  Default value  unlimited     If scanning of an archive is prematurely terminated for these reasons  the archive check box will remain deselected     Note  We do not recommend changing the default values  under normal circumstances  there should be no reason  to modify them     30    4 1 1 6 6 Other    You can configure the following options in the Other section     Log all objects     If this option is selected  the log file will show all the scanned files  even those not infected  For  example  if an infiltration is found within an archive  the log will list also clean files contained within the archive     Enable Smart optimization     With Smart Optimization enabled  the most optimal settings are u
107. earch          3 3 Trusted zone setup    It is necessary to configure the Trusted zone to protect your computer in a network environment  You can allow  other users to access your computer by configuring the Trusted zone to allow sharing  Click Setup    Network     Change the protection mode of your computer in the network     A window will display options allowing you to  choose the desired protection mode of your computer in the network     Trusted zone detection occurs after ESET Smart Security installation and whenever your computer connects to a new  network  Therefore  there is usually no need to define the Trusted zone  By default  when a new zone is detected a  dialog window will prompt you to set the protection level for that zone     SMART SECURITY       New network connection detected    Select protection mode for this network     Subnet  10 1 193 0   255 255 255 0  DNS extension  hq eset com  DHCP address  10 1 81 21    Public network     Select this option if you are connecting to a public Wi Fi  e g     at a cafe  at an airport or in a hotel  The public mode makes  your computer invisible to other computers in the network     Home work network    N Choose this mode if you are connecting at home or at work   In this mode  your computer will be visible to other  computers in the network     You can decide for a different mode for this network later in the Setup section   Show Advanced setup    Cancel    Buy License WAE taU     Warning  An incorrect trusted zone co
108. ecovery        Document protection F  f714c092c725692feb44acd2b7d677f8        Startup scan F  IDR  Idr exe    Idle state scanning    t il Parental control  H Q Update   H 2 Tools      M User interface                Edit    Vf Remove  Q  Search   Wok    cancel   __Defeuit                        Note  A threat within a file will not be detected by the Real time file system protection module or Computer scan  module if a file meets the criteria for exclusion from scanning     Path     Path to excluded files and folders     Threat     If there is a name of a threat next to an excluded file  it means that the file is only excluded for the given  threat  not completely  If that file becomes infected later with other malware  it will be detected by the antivirus  module  This type of exclusion can only be used for certain types of infiltrations and it can be created either in the  threat alert window reporting the infiltration  click Show advanced options and then select Exclude from  detection   or by clicking Setup    Quarantine and then right clicking the quarantined file and selecting Restore and  exclude from detection from the context menu     Add        Excludes objects from detection  Edit        Enables you to edit selected entries    Remove     Removes selected entries    28    4 1 1 6 ThreatSense engine parameters setup    ThreatSense is technology comprised of many complex threat detection methods  This technology is proactive   which means it also provides protection d
109. ection or Parental control  In these logs you can see time  URL address  user and application that created a  connection to the particular website       Antispam protection     Contains records related to email messages that were marked as spam     76      Parental control   Shows web pages blocked or allowed by Parental control  The Match type and Match values  columns tell you how the filtering rules were applied       Device control     Contains records of removable media or devices that were connected to the computer  Only  devices with respective Device control rules will be recorded to the log file  If the rule does not match a  connected device  a log entry for a connected device will not be created  Here you can also see details such as  device type  serial number  vendor name and media size  if available      In each section  the displayed information can be directly copied to the clipboard  keyboard shortcut Ctrl   C  by  selecting the entry and clicking Copy  To select multiple entries  the CTRL and SHIFT keys can be used     You can show the context menu by right clicking a specific entry  The following options are available in the context  menu       Filter records of the same type     After activating this filter  you will only see records of the same type   diagnostics  warnings            Filter    Find        When enabled  a Log filtering window will pop up where you can define the filtering criteria      Disable filter     Clears all filter settings  as desc
110. end only excluding  web certificates that are guaranteed to be safe and where communication utilizing the certificates does not need to  be checked  To delete selected items from the list  click Remove  Click Show  or double click the certificate  to  display information about the selected certificate     4 3 3 4 1 3 Encrypted SSL communication    If the computer is configured for SSL protocol scanning  a dialog window prompting you to choose an action may be  opened when there is an attempt to establish an encrypted communication  using an unknown certificate   The  dialog window contains the following information  name of the application that initiated the communication and  name of the certificate used     If the certificate is not located in the Trusted Root Certification Authorities store  it is considered to be untrusted   The following actions are available for certificates     Yes    The certificate will be temporarily marked as trusted  the alert window will not be displayed on the next  attempt to use the certificate for the duration of the current session     Yes  always     Marks the certificate as trusted and adds it to the list of trusted certificates     no alert windows will be  displayed for trusted certificates     No   Marks the certificate as untrusted for the current session    the alert window will be displayed on the next  attempt to use the certificate     Exclude     Adds the certificate to the list of excluded certificates     data transferred over t
111. ent protection x i  i LE Email dents Ports used by IMAP protocol   Email dient integration 143  a POP3  POP3S IMAPS scanner setup  H E Antispam protection fitteri  i B eb access protection        i  iB Protocol filtering    Do not use IMAPS protocol checking  Excluded applications     Use IMAPS protocol checking for selected ports  Exduded IP addresses  SSL Ports used by IMAPS protocol   r4 Anti Phishing protection 585  993   M Parental control  H 2 Tools  H B User interface  roii   cms    pefau               4 3 1 3 POP3  POPSS filter    The POP3 protocol is the most widespread protocol used to receive email communication in an email client  application  ESET Smart Security provides protection for this protocol regardless of the email client used     The protection module providing this control is automatically initiated at system startup and is then active in  memory  For the module to work correctly  please make sure it is enabled     POP3 protocol checking is performed  automatically without requiring re configuration of the email client  By default  all communication on port 110 is  scanned  but other communication ports can be added if necessary  Multiple port numbers must be delimited by a  comma     Encrypted communication will be not scanned  To enable the scanning of encrypted communication and view the  scanner setup  navigate to SSL protocol checking in Advanced setup section  click Web and email    Protocol filtering     SSL and enable the Always scan SSL protoco
112. ers  gt   87 smss exe 264  Critical Files See 348  H Q System Scheduler Tasks     E System Information  gt      wininitexe 396  f About    a winlogon exe 448   gt   87  services exe 476    4 m r  E  c  windows system32 smss exe  SHAL A81B48A5D6A06543ED36B7E6EA75C5E52B79DD37    Last Write Time 2009 07 14 03 14 J  Creation Time 2009 07 14 01 11  File Size 69632  File Description Windows Session Manager  Company Name Microsoft Corporation E  File Version 6 1 7600 16385  win7 rtm 090713 1255   Product Name Microsoft   Windows   Operating System  Internal Name     smss exe  Signer Microsoft Corporation 3  Log Status  Cloud  Age 2 years ago  Cumentlog   Generated   Cloud  Volume 10000000                    95    Help    Contains information about the application and its functions     Detail    This setting influences the information displayed in the main program window to make the information easier to  work with  In  Basic  mode  you have access to information used to find solutions for common problems in your  system  In the  Medium  mode  the program displays less used details  In  Full  mode  ESET SysInspector displays  all the information needed to solve very specific problems     Filtering    Item filtering is best used to find suspicious files or registry entries in your system  By adjusting the slider  you can  filter items by their Risk Level  If the slideris set all the way to the left  Risk Level 1   then all items are displayed   By moving the slider to the right  the p
113. ers or Groups dialog window that allows you to select desired users   e Delete     Removes the selected user from the filter     Note that not all devices can be limited by user rules   for example imaging devices do not provide information  about users  only about invoked actions      4 1 4 HIPS    Host based Intrusion Prevention System  HIPS  protects your system from malware and unwanted activity  attempting to negatively affect your computer  HIPS utilizes advanced behavioral analysis coupled with the  detection capabilities of network filtering to monitor running processes  files and registry keys  HIPS is separate  from Real time file system protection and is not a firewall  it monitors only processes running within the operating  system     HIPS settings are located in Advanced setup  F5   To access HIPS in the Advanced setup tree  click Computer    HIPS   The HIPS state  enabled disabled  is displayed in the ESET Smart Security main window  in the Setup pane on the  right side of the Computer section     Warning  Changes to HIPS settings should only be made by an experienced user     ESET Smart Security has built in Se f defense technology that prevents malicious software from corrupting or  disabling your antivirus and antispyware protection  Self defense protects files and registry keys considered crucial  to the function of ESET Smart Security and ensures that potentially malicious software has no privileges to make any  modifications to these locations     Changes
114. ersion of Microsoft    106    Windows     Windows AIK supports     e Windows 7   e Windows Vista   e Windows XP Service Pack 2 with KB926044  e Windows XP Service Pack 3    5 7 2 How to create rescue CD  To launch the ESET SysRescue wizard  click Start    Programs    ESET    ESET Smart Security    ESET SysRescue     First  the wizard checks for the presence of Windows AIK or ADK and a suitable device for the boot media creation   If Windows AIK or ADK is not installed on the computer  or it is either corrupt or installed incorrectly   the wizard  will offer you the option to install it  or to enter the path to your Windows AIK or ADK folder  http   go eset eu AIK   http   www microsoft com en us download details aspx id 30652      NOTE  Since Windows AIK is over 1 GB in size  a high speed internet connection is required to download     When installing Windows ADK choose only packages Deployment Tools and Windows Preinstallation Enviroment   Windows PE  to install  Since these packages over 3 0 GB in size  a high speed internet connection is required to  download     In the next step  select the target media where ESET SysRescue will be located     5 7 3 Target selection    In addition to CD DVD USB  you can choose to save ESET SysRescue in an ISO file  Later on  you can burn the ISO  image to a CD DVD  or use it some other way  e g  in a virtual environment such as VMware or VirtualBox      If you select USB as the target medium  booting may not work on certain computers  Som
115. es  etc   we recommend that  you do the following       Open ESET Smart Security and click Computer scan    Click Smart scan  for more information  see Computer scan   e After the scan has finished  review the log for the number of scanned  infected and cleaned files    If you only want to scan a certain part of your disk  click Custom scan and select targets to be scanned for viruses     32    4 1 1 8 Document protection    The Document protection feature scans Microsoft Office documents before they are opened  as well as files  downloaded automatically by Internet Explorer such as Microsoft ActiveX elements  Document protection provides  a layer of protection in addition to Real time file system protection  and can be disabled to enhance performance  on systems that are not exposed to a high volume of Microsoft Office documents     Integrate into system activates the protection system  To modify this option  press F5 to open the Advanced setup  window and click Computer    Antivirus and antispyware    Document protection in the Advanced setup tree     This feature is activated by applications that use Microsoft Antivirus API  e g   Microsoft Office 2000 and higher  or  Microsoft Internet Explorer 5 0 and higher      4 1 2 Removable media    ESET Smart Security provides automatic removable media  CD DVD USB      scanning  This module allows you to  scan an inserted media  This may be useful if the computer administrator wishes to prevent the users from using  removable media
116. ess ESET SysInspector two ways  From the integrated version in ESET Security solutions or by  downloading the standalone version  SysInspector exe  for free from ESET s website  Both versions are identical in  function and have the same program controls  The only difference is how outputs are managed  The standalone and  integrated versions each allow you to export system snapshots to an  xml file and save them to disk  However  the  integrated version also allows you to store your system snapshots directly in Tools    ESET SysInspector  except ESET  Remote Administrator   For more information see section ESET SysInspector as part of ESET Smart Security     Please allow some time while ESET SysInspector scans your computer  It may take anywhere from 10 seconds up to  a few minutes depending on your hardware configuration  operating system and the number of applications  installed on your computer     5 6 1 1 Starting ESET SysInspector    To start ESET SysInspector  simply run the Sys nspector exe executable you downloaded from ESET s website  If you  already have one of the ESET Security solutions installed  you can run ESET SysInspector directly from the Start  Menu  click Programs    ESET    ESET Smart Security      Please wait while the application inspects your system  which could take up to several minutes     94    5 6 2 User Interface and application usage    For clarity the main program window is divided into four major sections     Program Controls located on the top
117. esses are displayed in the tool ESET  SysInspector with file path beginning with       Those symbols provide pre launch optimization for those  processes  they are safe for the system    Network connections    The Description window contains a list of processes and applications communicating over the network using the  protocol selected in the Navigation window  TCP or UDP  along with the remote address where to which the  application is connected to  You can also check the IP addresses of DNS servers     The Detail window contains additional information for items selected in the Description window such as the file  size or its hash   Important Registry Entries    Contains a list of selected registry entries which are often related to various problems with your system like those  specifying startup programs  browser helper objects  BHO   etc     In the Description window you may find which files are related to specific registry entries  You may see additional  details in the Details window     Services    The Description window Contains a list of files registered as windows Services  You may check the way the service is  set to start along with specific details of the file in the Details window     Drivers    A list of drivers installed in the system     Critical files    The Description window displays content of critical files related to the Microsoft windows operating system     System Scheduler Tasks    Contains a list of tasks triggered by Windows Task Scheduler at a spe
118. executed     If the script was not recognized  a dialog window with the following message will appear  The selected service  script is not signed  Running unsigned and unknown scripts may seriously harm your computer data  Are you sure  you want to run the script and carry out the actions  This may be caused by inconsistencies within the script   damaged heading  corrupted section title  empty line missing between sections etc    You can either reopen the  script file and correct the errors within the script or create a new service script     5 6 5 FAQ    Does ESET SysInspector require Administrator privileges to run      While ESET SysInspector does not require Administrator privileges to run  some of the information it collects can  only be accessed from an Administrator account  Running it as a Standard User or a Restricted User will result in it  collecting less information about your operating environment     Does ESET SysInspector create a log file      ESET SysInspector can create a log file of your computer s configuration  To save one  click File    Save Log in the  main program window  Logs are saved in XML format  By default  files are saved to the  USERPROFILE  My  Documents  directory  with a file naming convention of  SysInpsector  COMPUTERNAME  YYMMDD HHMM  XML    You may change the location and name of the log file to something else before saving if you prefer     How do   view the ESET SysInspector log file      To view a log file created by ESET SysInspector
119. f files for analysis section     ESET SysRescue   Launches the ESET SysRescue creation wizard     Note  ESET SysRescue in ESET Smart Security 6 is currently not available for Windows 8  We recommend that you  create an ESET SysRescue disk on another version of Microsoft Windows     ESET Social Media Scanner     Link to a social media application  e g  Facebook  intended to protect social media  users against threats  This application is independent from other ESET products and is completely free     4 6 1 Log files    Log files contain information about all important program events that have occurred and provide an overview of  detected threats  Logging is an essential part of system analysis  threat detection and troubleshooting  Logging is  performed actively in the background with no user interaction  Information is recorded based on the current log  verbosity settings  It is possible to view text messages and logs directly from the ESET Smart Security environment   as well as to archive logs     Log files are accessible from the main program window by clicking Tools  gt  Log files  Select the desired log type from  the Log drop down menu  The following logs are available       Detected threats     The threat log offers detailed information about infiltrations detected by ESET Smart Security    The information includes the time of detection  name of infiltration  location  the performed action and the  name of the user logged in at the time the infiltration was detected  D
120. for web page        This is a quick way to set an exception for a web page for the selected account  Enter  the URL address of the web page into the URL field and select the account from the list below  If you select the  Block check box  the web page will be blocked for this account  If you leave this check box deselected  the web  page will be allowed        Web page exceptions         If you want to create an exception for the specified URL or change the category of the web page  please  select which accounts the exception or change of category is related to     URL  u  http    www examplepage org             I Apetko PCpetko                Exceptions defined here are superior to the categories defined for the selected account s   For example  if the  account has the News category blocked  but you have defined an allowed news webpage as an exception  the  account can access the allowed webpage  You can check the changes made here in the Blocked and allowed web  pages section     Show log  This shows a detailed log of the Parental control activity  blocked pages  the account the page was  blocked for  reason  etc    You can also filter this log based on the criteria you choose by clicking Filter       66    4 4 1 Web page content filtering    If the check box next to a category is selected  it is allowed  Deselect the check box next to a specific category to  block it for the selected account                                   L8 latin  jozko Help  Web page content filtering
121. formation and set up predefined connections after running  ESET SysRescue     Select Automatic private IP address to obtain the IP address automatically from DHCP  Dynamic Host Configuration  Protocol  server     Alternatively  this network connection can use a manually specified IP address  also known as a static IP address    Select Custom to configure the appropriate IP settings  If you select this option  you must specify an IP address and   for LAN and high speed Internet connections  a Subnet mask  In Preferred DNS server and Alternate DNS server   type the primary and secondary DNS server addresses     5 7 4 5 Bootable USB device    If you have selected a USB device as your target medium  you can select one of the available USB devices on the  Bootable USB device tab  in case there are more USB devices      Select the appropriate target Device to which ESET SysRescue will be installed     Warning  The selected USB device will be formatted during the creation of ESET SysRescue  All data on the device  will be deleted     If you select Quick format  formatting removes all the files from the partition  but does not scan the disk for bad  sectors  Use this option if your USB device has been formatted previously and you are sure that it is not damaged     5 7 4 6 Burn    If you have selected CD DVD as your target medium  you can specify additional burning parameters in the Burn tab   Delete ISO file     Select to delete the temporary ISO file after the ESET SysRescue CD is 
122. ftware     malware   The inconvenience and danger to you is increased by the fact that the cost of sending spam is minimal  and authors  of spam have many tools to acquire new email addresses  In addition  the volume and variety of spam makes it very  difficult to regulate  The longer you use your email address  the more likely it will end up in a spam engine  database  Some hints for prevention     e  f possible  don t publish your email address on the Internet     Only give your email address to trusted individuals      f possible  don t use common aliases     with more complicated aliases  the probability of tracking is lower   e Don   t reply to spam that has already arrived in your inbox     Be careful when filling out Internet forms     be especially cautious of options such as  Yes    want to receive  information       Use  specialized  email addresses     e g   one for business  one for communication with your friends  etc    e From time to time  change your email address     Use an Antispam solution    6 4 1 Advertisements    Internet advertising is one of the most rapidly growing forms of advertising  Its main marketing advantages are  minimal costs and a high level of directness  what s more  messages are delivered almost immediately  Many  companies use email marketing tools to effectively communicate with current and prospective customers     This type of advertising is legitimate  since you may be interested in receiving commercial information about some  produc
123. gerous or unnecessary     5 6 2 2 Navigating in ESET SysInspector    ESET SysInspector divides various types of information into several basic sections called nodes  If available  you may  find additional details by expanding each node into its subnodes  To open or collapse a node  double click the  name of the node or click   or   next to the name of the node  As you browse through the tree structure of nodes  and subnodes in the Navigation window you may find various details for each node shown in the Description  window  If you browse through items in the Description window  additional details for each item may be displayed  in the Details window     The following are the descriptions of the main nodes in the Navigation window and related information in the  Description and Details windows     Running processes    This node contains information about applications and processes running at the time of generating the log  In the    96    Description window you may find additional details for each process such as dynamic libraries used by the process  and their location in the system  the name of the application s vendor and the risk level of the file     The Detail window contains additional information for items selected in the Description window such as the file  size or its hash     NOTE  An operating system is comprised of several important kernel components running constantly that provide  basic and vital functions for other user applications  In certain cases  such proc
124. hanged for all modules except Computer scan     4 1 1 6 1 Objects    The Objects section allows you to define which computer components and files will be scanned for infiltrations   Operating memory   Scans for threats that attack the operating memory of the system    Boot sectors     Scans boot sectors for the presence of viruses in the master boot record    Email files   The program supports the following extensions  DBX  Outlook Express  and EML     Archives     The program supports the following extensions  ARJ  BZ2  CAB  CHM  DBX  GZIP  ISO BIN NRG  LHA   MIME  NSIS  RAR  SIS  TAR  TNEF  UUE  WISE  ZIP  ACE  and many others     Self extracting archives     Self extracting archives  SFX  are archives needing no specialized programs     archives     to  decompress themselves     Runtime packers     After executing  runtime packers  unlike standard archive types  decompress in memory  In  addition to standard static packers  UPX  yoda  ASPack  FSG  etc    the scanner supports  thanks to code emulation   many more types of packers     4 1 1 6 2 Options    Use the Options section to select the methods used when scanning the system for infiltrations  The following  options are available     Heuristics     A heuristicis an algorithm analyzing the  malicious  activity of programs  The main advantage is the  ability to identify malicious software which did not exist  or was not identified by previous virus signatures  databases  The disadvantage is the small probability of false 
125. he given encrypted  channel will not be checked at all     4 3 4 Anti Phishing protection    The term phishing defines a criminal activity that uses social engineering  the manipulation of users in order to  obtain confidential information   Phishing is often used to gain access to sensitive data such as bank account  numbers  PIN numbers and more  Read more about this activity in the glossary  ESET Smart Security provides anti   phishing protection  web pages known to distribute this type of content can be blocked     We strongly recommend that you enable Anti Phishing in ESET Smart Security  This option can be accessed from  Advanced setup  F5  by navigating to Web and email    Anti Phishing protection     Please see also our Knowledgebase article for an updated and more detailed version of this help page     Accessing a phishing website    When you access a phishing website  you will receive the following dialog in your web browser  By clicking Proceed  to the site  not recommended   you will be able to access the website without a warning message     63         Alert    ESET Smart Security X      A Potential phishing threat    This page is identified as a phishing page  Show URL    Phishing pages often look similar to pages of known banks or other trusted institutions  in order to acquire personal information such as usernames  passwords or credit card  details  You are not advised to proceed to this page       Learn more about phishing    This page is not a phishing page
126. he separator  It is possible to specify an additional  path after a slash     for example  server authentication       store new auth  If multiple servers are listed  use random order  otherwise start with the first   Port  80  Public server key  a PEM file with the public key or certificate    30 8189 02 818100 E3 41 35 3B 44 AB AA 79 25 CA DB FD 9580 118194 729A    C9 3E BO FE 42 30 7A F0 E0 F3 4E 15 20 EA C2 66 3A 2B 94 CB AB 3C BD 48 7B 4E  8A E9 A1 32 18 F7 0C 73 95 64 8F 13 1F 9F 72 BE 58 09 77 69 6A E4 CO 4F 47 1E  A9 3B 720165 F3 A1 02 9E C5 AE CB 79 4C DB 59 5B 66 FA 16 52 EC E0 39 52FB    BC FC 2165 48 DA 44 8D F6 B8 66 61 29 OD AC 93 47 9C C7 54 5C 94 1E A6 BE  9B 21 1A DE A3 5D 02 030100 01          To test your settings  click Test  If authentication is successful  a Server authentication successful notification will  appear  If authentication is not configured properly  one of the following error messages will appear     Server authentication failed  Maximum time for authentication elapsed   The authentication server is inaccessible  Check the server name IP address and or verify the Personal firewall  settings of the client as well as the server section     An error has occurred while communicating with the server   The authentication server is not running  Start the authentication server service  see section Zone authentication        Server configuration    The name of the authentication zone does not match the server zone     The configured zone name does no
127. hive contains a file or files which are infected  there are two options for dealing with the archive   In standard mode  Standard cleaning   the whole archive would be deleted if all the files it contains are infected  files  In Strict cleaning mode  the archive would be deleted if it contains at least one infected file  regardless of the  status of the other files in the archive            e   eatS       r 9 mcm  Objects Cleaning  Options Cleaning level   Emm E 4    No deaning ir Strict deaning  Extensions  Limits In this mode  the program will attempt to automatically dean or delete  Other infected files  If no action can be performed and a user is logged in  an    alert window with a list of available actions may be displayed  An alert  window will also be displayed if the action fails                 Search Cancel Default          22    4 1 1 1 3 When to modify real time protection configuration    Real time protection is the most essential component of maintaining a secure system  Always be careful when  modifying its parameters  We recommend that you only modify its parameters in specific cases     After installing ESET Smart Security  all settings are optimized to provide the maximum level of system security for  users  To restore the default settings  click Default at the bottom right of the Real time file system protection  window  Advanced setup  gt  Computer  gt  Antivirus and antispyware  gt  Real time file system protection      4 1 1 1 4 Checking real time prote
128. ically add the sender s address to the Whitelist     56    4 3 2 Web access protection    Internet connectivity is a standard feature in a personal computer  Unfortunately  it has also become the main  medium for transferring malicious code  Web access protection works by monitoring communication between web  browsers and remote servers  and complies with HTTP  Hypertext Transfer Protocol  and HTTPS  encrypted  communication  rules     We strongly recommend that Web access protection is enabled  This option can be accessed from the main window  of ESET Smart Security by navigating to Setup    Web and email    Web access protection  Access to known web pages  with malicious content is always blocked        Oe E x       ESET SMART SECURITY    A Access denied    Access to the web page was blocked  Show URL    The web page is on the list of websites with potentially dangerous content           4 3 2 1 HTTP  HTTPs    By default  ESET Smart Security is configured to use the standards of most Internet browsers  However  the HTTP  scanner setup options can be modified in Advanced setup  F5   gt  Web and email  gt  Web access protection  gt  HTTP   HTTPS  In the main HTTP HTTPS scanner window  you can select or deselect Enable HTTP checking  You can also  define the port numbers used for HTTP communication  By default  the port numbers 80  HTTP   8080 and 3128  for  Proxy server  are predefined     ESET Smart Security supports HTTPS protocol checking  HTTPS communication uses an encry
129. ient protection     Only displays objects that were sent or received by email clients      Web access and Anti Phishing protection     Only displays objects downloaded by web browsers      Email client antispam protection     Displays the history of antispam statistics since the last startup     Below the statistics graphs  you can see the number of total scanned objects  latest scanned object and the statistics  timestamp  Click Reset to clear all statistics information     4 6 4 Watch activity    To see the current File system activity in graph form  click Tools    Watch activity  At the bottom of the graph is a  timeline that records file system activity in real time based on the selected time span  To change the time span   click Step  1    located at the bottom right of the window             e   SMART SECURITY        4 Tools Watch activity                   Home    Q Computer scan     Update   3k Setup    x Tools     Qe   aa    Activity    File system activity X       File system activity graph       Bl Amount of read data Step  1 second  last 10 minutes  v    Amount of written data       The following options are available       Step  1 second  last 10 minutes      The graph refreshes every second and the timeline covers the last 10 minutes   e Step  1 minute  last 24 hours      The graph is refreshed every minute and the timeline covers the last 24 hours   e Step  1 hour  last month      The graph is refreshed every hour and the timeline covers the last month   e Step
130. if you want to modify several scan  parameters  for example  detection methods      4 1 1 5 Exclusions    Exclusions enable you to exclude files and folders from scanning  To ensure that all objects are scanned for threats   we recommend only creating exclusions when it is absolutely necessary  However  there are situations where you   may need to exclude an object  for example large database entries that would slow your computer during a scan or  software that conflicts with the scan     To exclude an object from scanning     1  Click Add      2  Enter the path to an object or select it in the tree structure     You can use wildcards to cover a group of files  A question mark     represents a single variable character whereas    27    an asterisk     represents a variable string of zero or more characters     Examples    e  f you wish to exclude all files in a folder  type the path to the folder and use the mask              e To exclude an entire drive including all files and subfolders  use the mask  D        e  f you want to exclude doc files only  use the mask    doc     e  f the name of an executable file has a certain number of characters  and characters vary  and you only know the  first one for sure  say  D    use the following format   D     exe   Question marks replace the missing  unknown   characters        Advanced setup                   i E Antivirus and antispyware    E Real time file system protection Rath fxret          5        On demand computer scan C  R
131. iles should be quarantined if they cannot be  cleaned  if it is not safe or advisable to delete them or if they are being falsely detected by ESET Smart Security     You can choose to quarantine any file  This is advisable if a file behaves suspiciously but is not detected by the  antivirus scanner  Quarantined files can be submitted for analysis to the ESET Virus Lab        ESET Si    SMART SECURITY v      Tools Quarantine                        4S Home      Time Object name Size Reason Co    1 10 2012    G Users petko Desktop eicar com 68 B Eicar chiHak davinet  Computer scan E  Quarantine     Restore  Qo Update    Restore and exclude from scanning  Restore to     Setup  Delete from Quarantine Del  x Tools Submit for analysis        amp  Help and support       EM           Using the right mouse button will activate a context menu for the selected item           Quarantine        Restore            Files stored in the quarantine folder can be viewed in a table that displays the date and time of quarantine  the  path to the original location of the infected file  its size in bytes  reason  for example  object added by user   and  number of threats  for example  if itis an archive containing multiple infiltrations      Quarantining files    ESET Smart Security automatically quarantines deleted files  if you have not canceled this option in the alert  window   If desired  you can quarantine any suspicious file manually by clicking Quarantine    If this is the case  the  origina
132. indow  F5  and click Computer  gt  Antivirus and antispyware  gt   On demand computer scan  gt  Profiles     The Configuration profiles window includes the Selected profile drop   down menu that lists existing scan profiles and the option to create a new one  To help you create a scan profile to  fit your needs  see the ThreatSense engine parameters setup section for a description of each parameter of the  scan setup     Example  Suppose that you want to create your own scan profile and the Smart scan configuration is partially  suitable  but you don   t want to scan runtime packers or potentially unsafe applications and you also want to apply  Strict cleaning  In the Configuration profiles window  click Add     Enter the name of your new profile in the Profile  name field and select Smart scan from the Copy settings from profile drop down menu  Adjust the remaining  parameters to meet your requirements and save your new profile     Update    The profile editor in the Update setup section allows users to create new update profiles  Create and use your own  custom profiles  other than the default My profile  only if your computer uses multiple means to connect to update  servers     For example  a laptop that normally connects to a local server  Mirror  in the local network but downloads updates  directly from ESET update servers when disconnected from the local network  business trip  might use two profiles   the first one for connecting to the local server  the other one for
133. ine parameter setup   i   p Real time file system protection fe Em  bob i On demand computer scan ledia to scan on  Document protection V  Local drives     File open V  Removable media  Startup scan  7  Device control  V  File creation access  Idle state scanning      Network drives File execution ter shutdown   E Exdusions ZIN v xs v  Compu    Removable media   i    A Device control V  Start Real time file system protection automatically    Her HIPS   o E Gamer mode    H A Web and email  H  Parental control  H Q Update   3 Tools    lll User interface                Q  Search  Box   Cancel     Default               Media to scan  By default  all types of media are scanned for potential threats     Local drives     Controls all system hard drives   Device control     CD DVDs  USB storage  Bluetooth devices  etc   Network drives     Scans all mapped drives     We recommend that you keep the default settings and only modify them in specific cases  such as when scanning  certain media significantly slows data transfers     Scan on  Event triggered scanning     By default  all files are scanned upon opening  creation or execution  We recommend that you keep these default  settings  as they provide the maximum level of real time protection for your computer     e File open     Enables or disables scanning of opened files      File creation     Enables or disables scanning of newly created or modified files    File execution     Enables or disables scanning of executed files    Remo
134. ion     Monitors communication received through POP3 and IMAP protocol      Antispam protection     Scans unsolicited email  i e   spam      Anti Phishing protection     Filters websites suspected of distributing content intended to manipulate users into  submitting confidential information     To re enable the protection of the disabled security component  click Disabled and then Enable     NOTE  When disabling protection using this method  all disabled parts of protection will be enabled after a  computer restart     There are additional options at the bottom of the setup window  Use the Product activation    link to open a  registration form that will activate your ESET security product and send you an email with your authentication data   username and password   To load setup parameters using an  xml configuration file  orto save the current setup  parameters to a configuration file  use the Import and export settings    option     4 1 Computer    The Computer module can be found in the Setup pane after clicking on the Computer title  It shows an overview of  all protection modules  To turn off individual modules temporarily  click Enabled    Disable for    next to the desired  module  Note that this may decrease the protection level of your computer  To access detailed settings for each  module  click Configure       Click Edit exclusions    to open the Exclusion setup window  which allows you to exclude files and folders from  scanning        ESET Sm   Securt    SMART S
135. ion  CD DVD  ESET web  page  etc       If you purchased a retail boxed version of the product  select Activate using an Activation Key  The Activation Key is  usually located inside or on the back side of the product package  The Activation Key must be entered as supplied  for activation to be successful     If you received a Username and Password  select Activate using a Username and Password and enter your  credentials into the appropriate fields     10    If you would like to evaluate ESET Smart Security before making a purchase  select Activate Trial License  Fill in your  email address and country to activate ESET Smart Security for a limited time  Your test license will be emailed to  you  Trial licenses can only be activated once per customer     If you do not have a license and would like to buy one  click Purchase License  This will redirect you to the website  of your local ESET distributor     Select Activate Later if you would like to quickly evaluate our product and do not wish to activate it immediately  or  if you would like to activate your product at a later time     You can also activate your copy of ESET Smart Security directly from the program  Click the Program menu icon  located in the top right corner or right click on the ESET Smart Security icon in the system tray       and select Activate  your product    from the menu     2 4 Entering username and password    For optimal functionality  it is important that the program is automatically updated  This 
136. ion Advanced  update setup     4 6 11 Alerts and notifications    ESET Smart Security supports sending emails if an event with the selected verbosity level occurs  Click the Send  event notifications by email check box to enable this feature and activate email notifications                                                        e  J    9    EX  Advanced setup  m  Computer Alerts and notifications  t il  Network J  Send event notifications by email   8 8 Web and email SMTP server       Parental control  H Q Update localhost  E x Tools fles SMTP server requires authentication  POP   e Username  Password   Quarantine  ESET Lire Gnd Sender address  Recipient address   System updates    Di tics pcname  email com myname  email com  L E Ide     Send event notifications to LAN computers by means of the Messenger service  h m User interf  Send notifications to the Following computers  delimited by a comma    Interval between sending messages  sec   60  Minimum verbosity for notifications   Edit format     Diagnostic  Informative  Errors  Q  Search Critical Came    Defeut               SMTP server     The SMTP server used for sending notifications   Note  SMTP servers with SSL TLS encryption are not supported by ESET Smart Security   SMTP server requires authentication     If the SMTP server requires authentication  these fields should be filled in    with a valid username and password granting access to the SMTP server     86    Sender address   This field specifies the sender address
137. ions  for this functionality are available in the Advanced setup tree under User Interface    Context menu     Integrate into the context menu   Integrate the ESET Smart Security control elements into the context menu   The following options are available in the Menu type drop down menu       Full  scan first      Activates all context menu options  the main menu will display Scan without cleaning with ESET  Smart Security as the first option and Scan and clean as the second level item      Full  clean first      Activates all context menu options  the main menu will display Scan with ESET Smart Security as  the first option and Scan without cleaning as the second level item      8  Scan with ESET Smart Security    Advanced options  gt    8  Scan without cleaning       Quarantine file    Submit files for analysis          e Only scan     Only Scan without cleaning with ESET Smart Security will be displayed in the context menu     Only clean     Only Scan with ESET Smart Security will be displayed in the context menu     91    5  Advanced user    5 1 Profile manager    Profile manager is used in two places within ESET Smart Security    in the On demand computer scan section and in  the Update section     Computer scan    Your preferred scan parameters can be saved for future scanning  We recommend that you create a different profile   with various scan targets  scan methods and other parameters  for each regularly used scan     To create anew profile  open the Advanced setup w
138. irectly from the command line without running GUI   privacy generate log with sensitive information omitted    zip save outcome log in compressed zip archive    silent suppress progress window when generating log from the command line   blank launch ESET SysInspector without generating loading log   Examples   Usage    Sysinspector exe  load xml    gen save xml    privacy    zip   compareto xml     To load specificlog directly into the browser  use  SysInspector exe   clientlog xml   To generate log from the command line  use  SysInspector exe  gen   Wnynewlog xml   To generate log excluding sensitive information directly in a compressed file  use  SysInspector exe    gen   mynewlog zip  privacy  zip   To compare two log files and browse differences  use  SysInspector exe new xml old xml    NOTE  If the name of the file folder contains a gap  then should be taken into inverted commas     100    5 6 4 Service Script    Service script is a tool that provides help to customers that use ESET SysInspector by easily removing unwanted  objects from the system     Service script enables the user to export the entire ESET SysInspector log  or its selected parts  After exporting  you  can mark unwanted objects for deletion  You can then run the modified log to delete marked objects     Service Script is suited for advanced users with previous experience in diagnosing system issues  Unqualified  modifications may lead to operating system damage     Example    If you suspect that your co
139. is only possible if the  correct Username and Password are entered in Update setup     If you did not enter your Username and Password during installation  you can do so now  In the main program  window  click Help and support and then Activate License and enter the license data you received with your ESET  security product into the Product activation window     When entering your Username and Password  it is important to type them exactly as they are written     e The username and password are case sensitive and the hyphen in the username is necessary     The password is ten characters long and all lowercase    e We do not use the letter Lin passwords  use the number one  1  instead     e A big  0 is the number zero  0   a little  o  is the lowercase letter o     We recommend copying and pasting the data from the registration email to ensure accuracy     2 5 Upgrading to a more recent version    New versions of ESET Smart Security are issued to implement improvements or fix issues that cannot be resolved by  automatic updates to program modules  Upgrading to a more recent version can be accomplished in several ways     1  Automatically  by means of a program update   Since the program upgrade is distributed to all users and may have an impact on certain system configurations  it  is issued after a long testing period to ensure functionality with all possible system configurations  If you need to  upgrade to a newer version immediately after its release  use one of the method
140. isable updates for a set period of time  Alternatively  you can enable  previously disabled updates if you had postponed them indefinitely     ESET Smart Security records snapshots of virus signature database and program modules for use with the rollback  feature  In order to create virus database snapshots  leave Create snapshots of update files check box selected  The  Number of locally stored snapshots field defines the number of previous virus database snapshots stored     If you click Roll back  Advanced setup  F5   gt  Update  gt  Update rollback   you have to select a time interval from the  Suspend updates drop down menu that represents the period of time that the virus signature database and  program module updates will be paused        ea  sme     nl  Confirming this dialog rolls bac  12h  program modules to the For 36h  Additionally  updates will be s           Select Until revoked to postpone regular updates indefinitely until you restore update functionality manually   Because it represents a potential security risk  we do not recommend selecting this option     If a rollback is performed  the Roll back button changes to Allow updates  No updates will be allowed for the time  interval selected from the Suspend updates drop down menu  The virus signature database version is downgraded  to the oldest available and stored as a snapshot in the local computer file system           1    Advanced setup       E  Computer Update rollback    w  Network V  Create snapshots 
141. ist of snapshots in the  ESET SysInspector window  Those options are also available from the context menu  To view the selected system  snapshot  select Show from the context menu  To export the selected snapshot to a file  right click it and select  Export        Below is a detailed description of the available options       Compare     Allows you to compare two existing logs  It is suitable if you want to track changes between the  current log and an older log  For this option to take effect  you must select two snapshots to be compared    e Create        Creates a new record  Before that  you must enter a short comment about the record  To find out the  snapshot creation progress  of the currently generated snapshot   see the Status column  All completed  snapshots are marked by the Created status      Delete Delete all   Removes entries from the list    e Export        Saves the selected entry in an XML file  also in a zipped version      5 7 ESET SysRescue    ESET SysRescue is a utility which enables you to create a bootable disk containing one of the ESET Security solutions    itcan be ESET NOD22 Antivirus  ESET Smart Security or even some of the server oriented products  The main  advantage of ESET SysRescue is the fact that the ESET Security solution runs independent of the host operating  system  while it has a direct access to the disk and the entire file system  This makes it possible to remove  infiltrations which normally could not be deleted  e g   when the oper
142. ivated after a mouse click     To enable the use of animated icons that display the progress of various operations  select Use animated icons for  progress indication     If you want to have ESET Smart Security play a sound when important events occur during a scan  for example when  a threat is discovered or when the scan has finished  select Use sound signal     4 7 2 Alerts and notifications    The Alerts and notifications section under User interface allows you to configure how threat alerts and system  notifications  e g  successful update messages  are handled by ESET Smart Security  You can also set display time  and the level of transparency of system tray notifications   applies only to the systems supporting system tray  notifications      Deselect the check box next to Display alerts to cancel all alert windows  This is only suitable in certain situations   For most users we recommend that this option be left enabled  default      Notifications on the Desktop are informative only  and do not require or offer user interaction  They are displayed  in the notification area at the bottom right corner of the screen  To activate Desktop notifications  select Display  notifications on desktop   More detailed options such as notification display time and window transparency can be  modified by clicking Configure notifications  To preview the behavior of notifications  click Preview  To suppress  notifications when running a full screen application  select Do not display no
143. jans    Historically  computer Trojans  Trojan horses  have been defined as aclass of threats which attempt to present  themselves as useful programs and thus trick users into running them     Since Trojans are a very broad category  it is often divided into several subcategories     e Downloader     Malicious programs with the ability to download other threats from the Internet    e Dropper     Malicious programs with the ability to drop other types of malware onto compromised computers      Backdoor   Malicious programs which communicate with remote attackers  allowing them to gain access to the  computer and take control over it    e Keylogger      keystroke logger      A program which records each keystroke that a user types and sends the  information to remote attackers    e Dialer     Malicious programs designed to connect via premium rate numbers instead of the user s Internet service  provider  It is almost impossible for a user to notice that a new connection was created  Dialers can only cause  damage to users with dial up modems  which are no longer regularly used     112    If a file on your computer is detected as a Trojan  it is advisable to delete it  since it most likely contains nothing but  malicious code     6 1 4 Rootkits    Rootkits are malicious programs that grant Internet attackers unlimited access to a system  while concealing their  presence  Rootkits  after accessing a system  usually exploiting a system vulnerability   use functions in the  operati
144. ks  you can create new  update tasks with a user defined configuration  For more details about creating and configuring update tasks  see  section Scheduler     4 6 Tools    The Tools menu includes modules that help simplify program administration and offers additional options for  advanced users           ESET Social Media Scanner  Protect your accounts on social  networks    SMART SECURITY v  Tools   A Home      i Log files Scheduler  Li Last record  Number of scheduled tasks  7  Q Computer scan  J Protection statistics ag Quarantine    Update Threat and spam statistics Number of quarantined objects  2  Ik Setup EE Watch activity 9 ESET SysInspector    file system  network activity Number of computer status  snapshots  0      y Running processes gl Network connections        Help and support Reputation information powered by  a Network connections list  ESET Live Grid  e Submit sample for analysis wa ESET SysRescue  Analysis in ESET s laboratory   Create rescue CD       75    This menu includes the following tools     e Log files    Protection statistics    e Watch activity   e Running processes  if ESET Live Grid is enabled in ESET Smart Security    e Scheduler     Quarantine     Network connections  if Personal firewall is integrated in ESET Smart Security     e ESET SysInspector    Submit file for analysis     Allows you to submit a suspicious file for analysis to the ESET Virus Lab  The dialog window  displayed after clicking this option is described in the Submission o
145. l  Windows  Live Mail and Mozilla Thunderbird     4 3 1 4 1 Adding addresses to whitelist and blacklist    Email addresses belonging to people you communicate with frequently can be added to the whitelist to ensure that  no message originating from a whitelist address is ever classified as spam  Known spam addresses can be added to  the blacklist and always be classified as spam  To add a new address to the whitelist or blacklist  right click the  email and select ESET Smart Security    Add to Whitelist or Add to Blacklist  or click the Trusted address or Spam  address button in the ESET Smart Security Antispam toolbar in your email client     Similarly  the same process applies to spam addresses  If an email address is listed on the blacklist  each email  message which arrives from that address is classified as spam     4 3 1 4 2 Marking messages as spam    Any message viewed in your email client can be marked as spam  To do so  right click the message and click ESET  Smart Security    Reclassify selected messages as spam  or click Spam address in the ESET Smart Security Antispam  toolbar located in the upper section of your email client     Reclassified messages are automatically moved to the SPAM folder  but the sender s email address is not added to  the Blacklist  Similarly  messages can be classified as  not spam   If messages from the Junk E mail folder are  classified as not spam  they are moved to their original folder  Marking a message as not spam does not  automat
146. l computer    Remote port     Port of remote computer    Application     Indicates the application to which the rule applies   Modified     Date of the last modification     Profile     Select the profile from Display rules used in the profile drop down menu to display the profile s rules  filter     Created Modified     Name of the user who modified the rule   New   Click to create a new rule   Edit     Click to edit existing rules     Delete  Del      Click to delete existing rules     44    4 2 3 2 Editing rules    Modification is required each time any of the monitored parameters are changed  In this case  the rule cannot fulfill  the conditions and the specified action cannot be applied  If parameters have changed  the given connection may  be refused  which can result in problems with operation of the application in question  An example is a change of  network address or port number for the remote side     The upper part of the window contains three tabs     e General     Specify a rule name  the direction of the connection  the action  the protocol and the profile to which  the rule will apply      Local   Displays information about the local side of the connection  including the number of the local port or port  range and the name of the communicating application      Remote   This tab contains information about the remote port  port range   It also allows you to define a list of  remote IP addresses or zones for a given rule     Protocol represents the transfer proto
147. l control lets you block webpages that may contain potentially offensive material  In addition  parents can  prohibit access to more than 40 pre defined website categories and over 140 subcategories     To activate Parental control for a specific user account  follow the steps below     1  By default Parental control is disabled in ESET Smart Security  There are two methods for activating Parental  control     O Click Disabled in the Setup pane from the main program window and change the Parental control state to  Enabled    O Press F5to access the Advanced Setup tree  select Parental Control and then select the check box next to  Integrate into system     2  Click Setup    Parental control from the main program window  Even though Enabled appears next to Parental  control  you must configure Parental control for the desired account by clicking Not defined  In the Account setup  window enter an age to determine the level of access and recommended age appropriate web pages  Parental  control will now be enabled for the specified user account  Click Setup under an account name to customize  categories you want to allow or block in the Web page content filtering tab  To allow or block custom web pages    64    that do not match a category  click the Blocked and allowed web pages tab        ESET Smart Secu    SMART SECURITY v     4 Setup Parental control           2 Home 2  3  L1 8 Parental control   Enabled    Q Computer scan Password for Advanced setup is required to protect Pa
148. l file will not be removed from its original location  The context menu can also be used for this purpose   right click in the Quarantine window and select Quarantine        Restoring from Quarantine    Quarantined files can also be restored to their original location  Use the Restore feature for this purpose  which is  available from the context menu by right clicking a given file in the Quarantine window  If a file is marked as  potentially unwanted application  the Restore and exclude from scanning option is enabled  Read more about this  type of application in the glossary  The context menu also offers the Restore to    option which allows you to  restore a file to a location other than the one from which it was deleted     NOTE  If the program quarantined a harmless file by mistake  please exclude the file from scanning after restoring  and send the file to ESET Customer Care     Submitting a file from the Quarantine    If you have quarantined a suspicious file that was not detected by the program  or if a file was determined to be  infected incorrectly  for example  by heuristic analysis of the code  and subsequently quarantined  please send the  file to the ESET Virus Lab  To submit a file from quarantine  right click the file and select Submit for analysis from    85    the context menu     4 6 10 Proxy server setup    In large LAN networks  the connection of your computer to the Internet can be mediated by a proxy server  If this is  the case  the following settings 
149. l option     In this section  you can configure POP3 and POP3S protocol checking   Enable POP3 protocol checking     If enabled  all traffic through POP3 is monitored for malicious software   Ports used by POP3 protocol    A list of ports used by the POP3 protocol  110 by default      ESET Smart Security also supports POP3S protocol checking  This type of communication uses an encrypted channel  to transfer information between server and client  ESET Smart Security checks communications utilizing the SSL   Secure Socket Layer   and TLS  Transport Layer Security  encryption methods     Do not use POP3S checking     Encrypted communication will not be checked     Use POP3S protocol checking for selected ports     Check this option to enable POP3S checking only for ports defined  in Ports used by POP3S protocol     Ports used by POP3S protocol     A list of POP3S ports to check  995 by default      54    4 3 1 4 Antispam protection    Unsolicited email  called spam  ranks among the greatest problems of electronic communication  Spam represents  up to 80 percent of all email communication  Antispam protection serves to protect against this problem   Combining several email security principles  the Antispam module provides superior filtering to keep your inbox  clean                                             e  Ex  Advanced setup  m  Computer Antispam protection  6  Network Message processing  E B Web and email J  Add text to email subject   SPAM     D E Email dient protection e
150. ll help  ESET update its threat detection capabilities     ESET Live Grid will collect information about your computer related to newly detected threats  This information  may include a sample or copy of the file in which the threat appeared  the path to that file  the filename  the date  and time  the process by which the threat appeared on your computer and information about your computer s  operating system     By default  ESET Smart Security is configured to submit suspicious files to the ESET Virus Lab for detailed analysis   Files with certain extensions such as  doc or  xls are always excluded  You can also add other extensions if there are  particular files that you or your organization wants to avoid sending     The ESET Live Grid setup menu provides several options for enabling   disabling ESET Live Grid  which serves to  submit suspicious files and anonymous statistical information to ESET labs  It is accessible from the Advanced setup  tree by clicking Tools    ESET Live Grid     Participate in ESET Live Grid  recommended      Enables   disables ESET Live Grid  which serves to submit suspicious  files and anonymous statistical information to ESET labs     80    Do not submit statistics     Select this option if you do not want to submit anonymous information gathered by ESET  Live Grid about your computer  This information is related to newly detected threats  which may include the name  of the infiltration  information about the date and time it was detected  the
151. ll runs in the background but does not  demand any user interaction     You can enable or disable Gamer mode in the main program window by clicking Setup    Computer    Enable under  Gamer mode  or you can enable Gamer mode in the Advanced setup tree  F5  by expanding Computer  clicking  Gamer mode and selecting the check box next to Enable Gamer mode  Enabling Gamer mode is a potential security  risk  so the protection status icon in the taskbar will turn orange and display a warning  You will also see this  warning in the main program window where you will see Gamer mode enabled in orange     By selecting Enable Gamer mode when running applications in full screen automatically  Gamer mode will start  whenever you initiate a full screen application and will automatically stop after you exit the application  This is  especially useful for starting Gamer mode immediately after starting a game  opening a full screen application or  starting a presentation     You can also select Disable Gamer mode automatically after X minutes to define the amount of time after which  Gamer mode will automatically be disabled  default value is 1 minute      NOTE  If the Personal firewall is in Interactive mode and Gamer mode is enabled  you might have trouble  connecting to the Internet  This can be problematicif you start a game that connects to the Internet  Normally  you  would be asked to confirm such an action  if no communication rules or exceptions have been defined   but user  interacti
152. llows you to select from predefined scan profiles designed to  target specific locations  and also lets you choose specific scan targets     23    Smart scan    Smart scan allows you to quickly launch a computer scan and clean infected files with no need for user intervention   The advantage of Smart scan is it is easy to operate and does not require detailed scanning configuration  Smart  scan checks all files on local drives and automatically cleans or deletes detected infiltrations  The cleaning level is  automatically set to the default value  For more detailed information on types of cleaning  see Cleaning     Custom scan    Custom scan lets you specify scanning parameters such as scan targets and scanning methods  The advantage of  Custom scan is the ability to configure the parameters in detail  Configurations can be saved to user defined scan  profiles  which can be useful if scanning is repeatedly performed with the same parameters     Removable media scan    Similar to Smart scan     quickly launch a scan of removable media  such as CD DVD USB  that are currently  connected to the computer  This may be useful when you connect a USB flash drive to a computer and wish to scan  its content for malware and other potential threats     This type of scan can be also initiated by clicking Custom scan  and then selecting Removable media from the Scan  targets drop down menu and clicking Scan     See Scan progress for more information about the scanning process     We recomme
153. lnerabilities in their applications to appear and release security updates to eliminate potential threats on a  regular basis  It isimportant to download these security updates as they are released  Microsoft Windows and web  browsers such as Internet Explorer are two examples of programs for which security updates are released on a  regular schedule     Back up important data    Malware writers usually do not care about users  needs  and the activity of malicious programs often leads to total  malfunction of an operating system and the loss of of important data  It is important to regularly back up your  important and sensitive data to an external source such as a DVD or external hard drive  This will make it far easier  and faster to recover your data in the event of system failure     Regularly scan your computer for viruses    Detection of more known and unknown viruses  worms  trojans and rootkits are handled by the Real time file  system protection module  This means that every time you access or open a file  itis scanned for a malware activity   We recommend that you run a full Computer scan at least once a month because malware signatures may vary and  the virus signature database updates itself each day     Follow basic security rules    This is the most useful and most effective rule of all     always be cautious  Today  many infiltrations require user  intervention in order to be executed and distributed  If you are cautious when opening new files  you will save  c
154. lso Zone authentication     Client configuration      A zone represents a collection of network addresses that create one logical group  Each address in a given group is  assigned similar rules defined centrally for the whole group  One example of such a group is the Trusted zone  The  Trusted zone represents a group of network addresses which are fully trusted and not blocked by the Personal  firewall in any way     These zones can be configured using the Zones tab in the Zone and rule setup window by clicking the Edit button   Enter a Name for the zone  a Description  and add a remote IP address by clicking the Add IPv4 IPv6 address button     45    4 2 4 1 Network authentication    For mobile computers  it is recommended that you verify the network credibility of the network that you are  connecting to  The Trusted zone is identified by the local IP address of the network adapter  Mobile computers  often enter networks with IP addresses that are similar to the trusted network  If the Trusted zone settings are not  manually switched to Public network  the Personal firewall will continue to use the Home work network mode     To prevent this type of situation  we recommended using zone authentication     4 2 4 1 1 Zone authentication   Client configuration    In the Zone and rule setup window  click the Zones tab and create a new zone using the name of the zone  authenticated by the server  Then click Add IPv4 address and select the Subnet option to add a subnet mask that  co
155. might not detect a threat  the Advanced memory  Scanner is able to identify suspicious behavior and scan threats when they reveal themselves in system memory   This solution is effective against even heavily obfuscated malware     Unlike Exploit Blocker  Advanced Memory Scanner is a post execution method  which means that there is a risk that  some malicious activity could have been performed prior to its detecting a threat  however in the case that other  detection techniques have failed  it offers an additional layer of security     6 3 3 Vulnerability Shield    Vulnerability shield is an extension of the Personal firewall that improves the detection of known vulnerabilities  on the network level  By implementing detections for common vulnerabilities in widely used protocols such as  SMB  RPC and RDP  it constitutes another important layer of protection against spreading malware  network   conducted attacks and exploitations of vulnerabilities for which a patch has yet not been released or deployed     6 3 4 ESET Live Grid    Built on ThreatSense Net  advanced early warning system  ESET Live Grid utilizes data that ESET users have  submitted worldwide and sends it to the ESET Virus Lab  By providing suspicious samples and metadata from the  wild  ESET Live Grid enables us to react immediately to needs of our customers and keep ESET responsive to the  latest threats  ESET malware researchers use the information to build an accurate snapshot of the nature and scope  of global
156. mination should be made  by a security expert  What ESET SysInspector is designed for is to provide a quick assessment for security experts so  that they know what objects on a system they may want to further examine for unusual behavior     Why does ESET SysInspector connect to the Internet when run      Like many applications  ESET SysInspector is signed with a digital signature  certificate  to help ensure the software  was published by ESET and has not been altered  In order to verify the certificate  the operating system contacts a  certificate authority to verify the identity of the software publisher  This is normal behavior for all digitally signed  programs under Microsoft Windows     What is Anti Stealth technology      Anti Stealth technology provides effective rootkit detection     If the system is attacked by malicious code that behaves as a rootkit  the user may be exposed to data loss or theft   Without a special anti rootkit tool  itis almost impossible to detect rootkits     Why are there sometimes files marked as  Signed by MS   having a different   Company Name  entry at the same  time      When trying to identify the digital signature of an executable  ESET SysInspector first checks for a digital signature  embedded in the file  If a digital signature is found  the file will be validated using that information  If a digital  signature is not found  the ESI starts looking for the corresponding CAT file  Security Catalog    systemroot    system32 catroot  th
157. mputer is infected by a virus which is not detected by your antivirus program  follow the  step by step instructions below     1  Run ESET SysInspector to generate a new system snapshot    2  Selectthe first item in the section on the left  in the tree structure   press Shift and select the last item to mark  all items    3  Right click the selected objects and select Export Selected Sections To Service Script      The selected objects will be exported to a new log    5  This is the most crucial step of the entire procedure  open the new log and change the     attribute to   for all  objects you want to remove  Please make sure you do not mark any important operating system files objects    6  Open ESET SysInspector  click File    Run Service Script and enter the path to your script    7  Click OK to run the script     B    5 6 4 1 Generating Service script    To generate a script  right click any item from the menu tree  in the left pane  in the ESET SysInspector main  window  From the context menu  select either Export All Sections To Service Script or Export Selected Sections To  Service Script     NOTE  It is not possible to export the service script when two logs are being compared     5 6 4 2 Structure of the Service script    In the first line of the script s header  you can find information about the Engine version  ev   GUI version  gv  and  the Log version  Iv   You can use this data to track possible changes in the  xml file that generates the script and  prevent a
158. n Microsoft Windows Home Servers     For more instructions about ESET Anti Theft computer association and to learn how it works see How to add a new  device     3 5 Parental control tools    If you have already enabled Parental control in ESET Smart Security  you must also configure Parental control for  desired user accounts in order for Parental control to function properly     When Parental controls are active but user accounts have not been configured  Parental control is not set up will be  displayed in the Home pane of the main program window  Click Set up rules now and refer to the Parental control  chapter for instructions on how to create specific restrictions for your children to protect them from potentially  offensive material     17    4  Work with ESET Smart Security    The ESET Smart Security setup options allow you to adjust the protection levels of your computer and network        poo     SMART SECURITY v    Setup             gt     A Home T    NN Computer    Real time file system protection   Enabled    o Computer scan HIPS   Enabled    Anti Theft Disabled       Update Gamer mode Disabled    Anti Stealth protection   Enabled    He Setup   gy Network  X Tools        Personal firewall   Enabled   3      s Help and support    Web and email          Web access protection   Enabled    Email client protection   Enabled    Antispam protection   Enabled    Anti Phishing protection   Enabled    a Parental control  Parental control Disabled am    Q Product activation 
159. nd information about the number of files found  that contain malicious code     NOTE  It is normal that some files  such as password protected files or files being exclusively used by the system   typically pagefile sys and certain log files   cannot be scanned     The progress bar shows the percentage of already scanned objects compared to objects still waiting to be scanned   This value is derived from the total number of objects included in a scan     Tips     Click the magnifier or arrow to show details about the scan that is currently running   You can run another parallel scan by clicking Smart scan or Custom scan        Objects     Shows the total number of scanned files  threats found and threats cleaned during a scan     Target  The name of the currently scanned object and its location     25           sea    SMART SECURITY v  Computer scan  m   Home  7 e  Smart scan am  x  Q Computer scan z v  Threats found  0  Qo Update Objects cleaned  0 b p x      Scanning  C  Program Files ESET ESET Smart Security ekrnSmonLang dll  Open scan in a new window  xk Setup Q After all scans computer takes no action Y  X Tools  Q Smart scan CQ Custom scan     Local disk scan 4 Selection of scan profile and targets        Help and support io scan  LA   Removable media scan     Repeat last scan  Scanning of USB  DVD  CD and other G Date and time of the last scan   removable media 2  7  2013 12 11 58  B Scan logs  3 Computer scan setup      es  2          After all scans computer takes no
160. nd that you run a computer scan at least once a month  Scanning can be configured as a scheduled task  from Tools  gt  Scheduler  How to schedule a weekly computer scan     4 1 1 2 1 Custom scan launcher    If you wish not to scan entire disk space but only a specific target  you can use the Custom scan tool by clicking  Computer scan  gt  Custom scan and select an option from the Scan targets drop down menu or select specific targets  from the folder  tree  structure     Scan targets window allows you to define which objects  memory  drives  sectors  files and folders  are scanned for  infiltrations  Select targets from the tree structure  which lists all devices available on the computer  The Scan  targets drop down menu allows you to select predefined scan targets     By profile settings     Selects targets set in the selected scan profile   Removable media   Selects diskettes  USB storage devices  CD DVD   Local drives     Selects all system hard drives    Network drives     Selects all mapped network drives    No selection     Cancels all selections     To quickly navigate to a scan target or to directly add a desired target  folder or file s    enter itin the blank field  below the folder list  This is only possible if no targets were selected in the tree structure and the Scan targets  menu is set to No selection     24          Custom scan           Scan targets  Scan profile               Computer   _  9  Operating memory   V  Boot sector   Ci cA    e 0      Pigs E  
161. nection properties that regularly change     The Selected profile drop down menu displays the currently selected profile and is set to My profile by default  To  create a new profile  click Profiles    and then click Add    and enter your own Profile name  When creating a new  profile  you can copy settings from an existing one by selecting it from the Copy settings from profile drop down  menu     In the profile setup window  you can specify the update server from a list of available servers or add a new server   The list of existing update servers is listed in the Update server drop down menu  To add a new update server  click  Edit    in the Update settings for selected profile section and then click Add     4 5 1 2 Advanced update setup    To view the Advanced update setup  click Setup     Advanced update setup options include the configuration of  Update mode  HTTP Proxy and LAN     4 5 1 2 1 Update mode    The Update mode tab contains options related to the program component update  The program enables you to  predefine its behavior when a new program component upgrade is available     Program component updates  PCUs  include new features or make changes to features from previous versions   PCUs can be performed automatically without user intervention  or you can choose to be notified each time a PCUis  performed  After a program component update is installed  a computer restart may be required  In the Program  component update section  three options are available      
162. nections      Active connection  127 0 0 1 30606     127 0 0 1 55320  owner  ekrn exe     Active connection  127 0 0 1 50007   gt  127 0 0 1 50006      Active connection  127 0 0 1 55320   gt  127 0 0 1 30606  owner  OUTLOOK EXE     Listening on    port 135  epmap   owner  svchost exe     Listening on    port 2401  owner  fservice exe Listening on    port 445  microsoft ds   owner   System    ss        When the script runs  it will locate the owner of the socket in the marked TCP connections and stop the socket   freeing system resources     04  UDP endpoints  This section contains information about existing UDP endpoints     Example     UDP endpoints          0 0 0 0  port 123   ntp     0 0 0 0  port 3702    0 0 0 0  port 4500  ipsec msft     0 0 0 0  port 500  isakmp   al    When the script runs  it will isolate the owner of the socket at the marked UDP endpoints and stop the socket     05  DNS server entries   This section contains information about the current DNS server configuration   Example    05  DNS server entries      204 74 105 85      172  16 152  2  Leste    Marked DNS server entries will be removed when you run the script     06  Important registry entries    This section contains information about important registry entries     102    Example     06  Important registry entries      Category  Standard Autostart  3 items   HKLM SOFTWARE Microsoft Windows CurrentVersion Run    HotKeysCmds   C  Windows system32 hkcmd exe     IgfxTray   C  Windows system32 igfxtray
163. need to be defined  Otherwise the program will not be able to update itself  automatically  In ESET Smart Security  proxy server setup is available in two different sections within the Advanced  setup tree     First  proxy server settings can be configured in Advanced setup under Tools  gt  Proxy server  Specifying the proxy  server at this level defines global proxy server settings for all of ESET Smart Security  Parameters here will be used  by all modules requiring connection to the Internet     To specify proxy server settings for this level  select the Use proxy server check box and then enter the address of  the proxy server into the Proxy server field  along with the Port number of the proxy server     If communication with the proxy server requires authentication  select the Proxy server requires authentication  check box and enter a valid Username and Password into the respective fields  Click Detect proxy server to  automatically detect and populate proxy server settings  The parameters specified in Internet Explorer will be  copied     NOTE  This feature does not retrieve authentication data  username and password   it must be supplied by you     Proxy server settings can also be established within Advanced update setup  Update branch of the Advanced setup  tree   This setting applies for the given update profile and is recommended for laptops that often receive virus  signature updates from different locations  For more information about this setting  see the sect
164. nfiguration may pose a security risk to your computer     16    NOTE  By default  workstations from a Trusted zone are granted access to shared files and printers  have incoming  RPC communication enabled and have remote desktop sharing available     3 4 Anti Theft    To protect your computer in case of a loss or theft  choose from the following options to register your computer  with the ESET Anti Theft system     1  After a successful activation click Enable Anti Theft to activate ESET Anti Theft features for the computer you just  registered        ESET Anti Theft                Free my eset com account is required to enable Anti   Theft    New to Anti Theft  Existing Anti Theft user   Email address     Create new account for free  With Anti     my email com    Theft you can     Watch thieves via built in camera Password     Collect snapshots of the missing    device s screen  Forgot password     See thief s location on a map    Access recent photos and snapshots H    from your online account Sign in    Create new account          anti theft eset com Search ESET Knowledge Base       2  If you see the ESET Anti Theft is available message in the Home pane of ESET Smart Security  consider activating  this feature for your computer  Click Enable ESET Anti Theft to associate your computer with ESET Anti Theft     3  From the main program window click Setup  and then click ESET Anti Theft and follow the instructions in the pop   up window     Note  ESET Anti Theft does not run o
165. ng is a description of options within the main menu    Home   Provides information about the protection status of ESET Smart Security    Computer scan     This option allows you to configure and launch a Smart scan or Custom scan    Update     Displays information about virus signature database updates    Setup     Select this option to adjust your security level for Computer  Web and email  Network and Parental control     Tools     Provides access to Log files  Protection statistics  Watch activity  Running processes  Network connections   Scheduler  Quarantine  ESET SysInspector and ESET SysRescue     Help and support     Provides access to help files  the ESET Knowledgebase  the ESET website and links to opena  Customer Care support request                        SMART SECURITY    fa Home Maximum protection  Q Computer scan     ape ESET Anti Theft is available  Anti Theft tracks and locates your missing or stolen laptop  Enable Anti  Theft and start  QE Setup getting protected now     Enable ESET Anti Theft Do not remind me again    d   Help and support Frequently used Q Run Smart scan    Statistics  9 ESET Social Media Scanner       Enable Gamer mode    Basic overview License valid until  29  12  2014       ESET Smart Security status  Protection active  no background  jobs using system resources       The Home screen informs you about the security and current protection level of your computer  The status window  also displays Frequently used features in ESET Smart Securi
166. ng system to avoid detection by antivirus software  they conceal processes  files and Windows registry data   For this reason  it is almost impossible to detect them using ordinary testing techniques     There are two levels of detection to prevent rootkits     1  When they try to access a system  They are still not present  and are therefore inactive  Most antivirus systems  are able to eliminate rootkits at this level  assuming that they actually detect such files as being infected     2  When they are hidden from the usual testing  ESET Smart Security users have the advantage of Anti Stealth  technology  which is also able to detect and eliminate active rootkits     6 1 5 Adware    Adware is a short for advertising supported software  Programs displaying advertising material fall under this  category  Adware applications often automatically open a new pop up window containing advertisements in an  Internet browser  or change the browser s home page  Adware is frequently bundled with freeware programs   allowing their creators to cover development costs of their  usually useful  applications     Adware itself is not dangerous     users will only be bothered with advertisements  Its danger lies in the fact that  adware may also perform tracking functions  as spyware does      If you decide to use a freeware product  please pay particular attention to the installation program  The installer  will most likely notify you of the installation of an extra adware program  Often you
167. ning methods included in the ThreatSense scanning engine  This means that  detection of malicious programs takes place even before being matched against the virus signature database   Scanning of POP3 and IMAP protocol communications is independent of the email client used     The options for this functionality are available through Advanced setup  gt  Web and email  gt  Email client protection     ThreatSense engine parameter setup     The advanced virus scanner setup enables you to configure scan targets   detection methods  etc  Click Setup    to display the detailed virus scanner setup window     After an email has been checked  a notification with the scan result can be appended to the message  You can elect  to Append tag messages to received and read mail or Append tag messages to sent mail  Be aware that on rare  occasions tag messages may be omitted in problematic HTML messages or forged by some viruses  The tag  messages can be added to received and read email  sent email or both  The available options are     e Never     No tag messages will be added at all     To infected email only     Only messages containing malicious software will be marked as checked  default    e To all scanned email     The program will append messages to all scanned email     Append note to the subject of received and read sent infected email     Select this check box if you want email  protection to include a virus warning in the subject of an infected email  This feature allows for simpl
168. ning of each entry to activate deactivate the tasks   By default  the following scheduled tasks are displayed in Scheduler       Log maintenance     Regular automatic update     Automatic update after dial up connection     Automatic update after user logon     Regular checking for latest product version  see Update mode      Automatic startup file check  after user logon      Automatic startup file check  after successful update of the virus signature database     Automatic first scan    To edit the configuration of an existing scheduled task  both default and user defined   right click the task and click  Edit    or select the task you want to modify and click Edit       Add a new task   1  Click Add    at the bottom of the window    2  Selectthe desired task from the pull down menu     3  Enter a name of the task and select one of the timing options       Once   The task will be performed only once  at the predefined date and time    e Repeatedly  The task will be performed at the specified interval  in hours        Daily     The task will run each day at the specified time    e Weekly     The task will run once or more times a week  on the selected day s  and time     Event triggered     The task will be performed on a specified event     4  Depending on the timing option you choose in the previous step  one of the following dialog windows will be  displayed     e Once   The task will be performed at the predefined date and time    e Repeatedly  The task will be performed
169. nstalled on the computer on which the ESET SysRescue CDis run     5 7 4 3 Advanced settings    The Advanced tab lets you optimize the ESET SysRescue CD according to the amount of memory on your computer   Select 576 MB and more to write the content of the CD to the operating memory  RAM   If you select less than 576  MB  the recovery CD will be permanently accessed when WinPE will be running     In the External drivers section  you can insert drivers for your specific hardware  usually network adapter   Although  WinPE is based on Windows Vista SP1  which supports a wide range of hardware  occasionally hardware is not  recognized  This will require you to add a driver manually  There are two ways of introducing a driver into an ESET  SysRescue compilation  manually  click Add  and automatically  click Aut  Search   In the case of manual  introduction  you need to select the path to the corresponding  inf file  applicable   sys file must also be present in  this folder   In the case of automatic introduction  the driver is found automatically in the operating system of the  given computer  We recommend using automatic introduction only if ESET SysRescue is used on a computer that has  the same network adapter as the computer on which the ESET SysRescue CD was created  During creation  the ESET  SysRescue driver is introduced into the compilation so you do not need to look for it later     108    5 7 4 4 Internet protocol    This section allows you to configure basic network in
170. ntage of your personal data     Spam represents up to 80 percent of all email communication  Antispam  protection serves to protect against this problem     ESET Anti Theft expands user level security in the case of alost or stolen  computer  Once users install ESET Smart Security and enable ESET Anti Theft   their device will be listed in the web interface  The web interface allows  users to manage their ESET Anti Theft configuration and perform actions  such as switching computers to the missing state     A license needs to be active in order for features of ESET Smart Security to be operational  It is recommended that  you renew your license several weeks before the license for ESET Smart Security expires     1 1 What s new in version 7    ESET Smart Security version 7 features many small improvements     Device control     A replacement of Removable media control used in version 5 and 6  This module allows you to  scan  block or adjust extended filters permissions and define a users ability to access and work with a given  device     Vulnerability shield     An extension of firewall that improves detection of known vulnerabilities on the network  level     Exploit blocker     Designed to fortify commonly exploited application types such as web browsers  PDF readers   email clients and MS Office components     Advanced memory scanner     Works in combination with Exploit Blocker to strengthen protection against  malware that has been designed to evade detection by antimalw
171. ntains the authentication server     Click the Zone authentication tab  Each zone can be set to authenticate to the server  The zone  its IP address and  subnet  will be valid after it is successfully authenticated    for example actions such as switching to a firewall profile  and adding an address subnet of the zone to the Trusted Zone will be performed only after successful  authentication     Enable IP addresses subnets in the zone will become valid    to make a zone that will become invalid if  authentication is unsuccessful  To select a Personal firewall profile to be activated after a successful zone  authentication  click Profiles       If you select Add addresses subnets of the zone to the Trusted Zone  the addresses subnets of the zone will be  added to the Trusted zone after successful authentication  recommended   If authentication is unsuccessful  the  addresses will not be added to the Trusted zone  If Switch to profile with the same name automatically  a new  profile will be created  is selected  a new profile will be created after successful authentication  Click Profiles    to  open the Firewall profiles window        Zone setup   Zone authentication    IP addresses subnets in the zone will become valid after successful  authentication in the network  increases secunty of mobile computers    Actions performed after successful authentication     V  Add addresses subnets of the zone to the Trusted zone                Automatic profile switching   7 Switch to pr
172. ntry points such as webpages  shared folders  via email or from  removable devices  USB  external disks  CDs  DVDs  diskettes  etc      Standard behavior    As a general example of how infiltrations are handled by ESET Smart Security  infiltrations can be detected using       Real time file system protection  Web access protection   Email client protection     On demand computer scan    Each uses the standard cleaning level and will attempt to clean the file and move it to Quarantine or terminate the  connection  A notification window is displayed in the notification area at the bottom right corner of the screen  For  more information about cleaning levels and behavior  see Cleaning     ESET SMART SECURITY 7 vx    Object    A C  Users petko AppData Local Microsoft Windows   Temporary Internet Files Low Content IE5   P8XWXBLE eicar com 1  txt  Threat    Eicar test file  Information   cleaned by deleting    31    Cleaning and deleting    If there is no predefined action to take for Real time file system protection  you will be prompted to select an  option in the alert window  Usually the options Clean  Delete and No action are available  Selecting No action is not  recommended  as this will leave infected files uncleaned  The exception to this is when you are sure that a file is  harmless and has been detected by mistake     ESET SMART SECURITY 7    Alert    Threat found    Object  C  Users petko AppData Local Microsoft Windows Te    eicar com 1  txt    Threat  Eicar test file
173. ny inconsistencies during execution  This part of the script should not be altered     The remainder of the file is divided into sections in which items can be edited  denote those that will be processed  by the script   You mark items for processing by replacing the         character in front of an item with a         character   Sections in the script are separated from each other by an empty line  Each section has a number and title     01  Running processes    This section contains a list of all processes running in the system  Each process is identified by its UNC path and   subsequently  its CRC16 hash code in asterisks         Example     01  Running processes       SystemRoot System32 smss exe  4725      C  Windows system32 svchost exe  FD08     C  Windows system32 module32 exe  CF8A   Ls     In this example a process  module32 exe  was selected  marked by a         character   the process will end upon  execution of the script     02  Loaded modules    This section lists currently used system modules     101    Example     02  Loaded modules      c  windows system32 svchost exe    c  windows system32 kernel32 dl1l    c  windows system32 khbekhb dll    c  windows system32 advapi32 dll    kesad    In this example the module khbekhb dll was marked by a          When the script runs  it will recognize the processes  using that specific module and end them     03  TCP connections  This section contains information about existing TCP connections     Example     03  TCP con
174. o background  jobs using system resources ad       The red icon and red Maximum protection is not ensured status signals critical problems   There are several reasons this status may be displayed  for example       Product not activated     You can activate ESET Smart Security from Home by clicking either Activate full  version or Buy now under protection status       Virus signature database is out of date     This error will appear after several unsuccessful attempts to  update the virus signature database  We recommend that you check the update settings  The most  common reason for this error is incorrectly entered authentication data or incorrectly configured    connection settings       Antivirus and antispyware protection disabled     You can re enable antivirus and antispyware protection  by clicking on Start all antivirus and antispyware protection modules       ESET Personal firewall disabled     This problem is signaled also by a security notification next to the  Network item on your desktop  You can re enable network protection by clicking on Enable firewall       License expired     This is indicated by the Protection status icon turning red  The program is not able to  update after the license expires  We recommend following the instructions in the alert window to renew  your license     The orange icon indicates that protection of your computer is limited  For example  there is a problem  updating the program or your license is nearing its expiration date   The
175. of update files  H  Web and email    E AQ Parental control Number of locally stored snapshots  2      FQ Update fj Roll back    Pel Settings       2 9 Tools    lll User interface                            Q  Search Cox   Cancel     Default               Example  Let the number 6871 be the most recent version of virus signature database  6870 and 6868 are stored as a  virus signature database snapshots  Note that 6869 is not available because  for example  the computer was turned  off and a more recent update was made available before 6869 was downloaded  If the Number of locally stored  snapshots field is set to 2 and you click Roll back  the virus signature database  including program modules  will be  restored to version number 6868  This process may take some time  Check whether the virus signature database  version has downgraded from the main program window of ESET Smart Security in the Update section     74    4 5 3 How to create update tasks  Updates can be triggered manually by clicking Update virus signature database in the primary window displayed  after clicking Update from the main menu     Updates can also be run as scheduled tasks  To configure a scheduled task  click Tools  gt  Scheduler  By default  the  following tasks are activated in ESET Smart Security       Regular automatic update    Automatic update after dial up connection    Automatic update after user logon    Each update task can be modified to meet your needs  In addition to the default update tas
176. ofile with the same name automatically  a new profile will be  created   Switch to profile  advanced settings  Profiles  Authentication type     Using ESET Authentication Server      By local network configuration              ok J  cancel      There are two authentication types available           1  Using ESET authentication server    Zone authentication searches for a specific server in the network and uses asymmetric encryption  RSA  to  authenticate the server  The authentication process is repeated for each network your computer connects to  Click  Setup    and specify a server name  server listening port and a public key that corresponds to the private server key   see section Zone authentication     Server configuration   The server name can be entered in the form of an IP  address  DNS or NetBios name  The server name can be followed by a path specifying the location of the key on the  server  e g   server name  directory1 directory2 authentication   Enter multiple servers  separated by semicolons   to serve as alternate servers if the first one is unavailable     46    The public key can be a file of one of the following types     e PEM encrypted public key   pem   This key can be generated using the ESET Authentication Server  see section Zone authentication    Server  configuration     e Encrypted public key   e Public key certificate   crt        Authentication server  name or IP address   If you want to use multiple servers  a  secondary one   use semicolon as t
177. om locations that may only be accessed after a user has logged in   includes files that are only run by a specific user  typically files in HKEY_CURRENT_USER SOFTWARE  Microsoft   Windows CurrentVersion Run      Lists of files to be scanned are fixed for each aforementioned group   Scan priority     The level of priority used to determine when a scan will start     e Normal     at an average system load   e Lower    at a low system load   e Lowest     when the system load is the lowest possible   e When idle  the task will be performed only when the system is idle    4 1 1 4 Idle state scanning    The idle state scanner can be configured and enabled in Advanced setup under Computer    Antivirus and  antispyware  gt  Idle state scanning  When the computer is in idle state  a silent computer scan is performed on all  local drives  See Idle state detection triggers for a full list of conditions that must be met in order to trigger the  idle state scanner     By default  the idle state scanner will not run when the computer  notebook  is operating on battery power  You  can override this setting by selecting the check box next to Run even if the computer is on the battery in Advanced  setup     Select Enable logging in Advanced setup to record a computer scan output in the Log files section  from the main  program window click Tools  gt  Log files and select Computer scan from the Log drop down menu      The last setting here is ThreatSense engine parameter setup  Click Setup    
178. on is disabled in Gamer mode  The solution is to define a communication rule for every application that  might be in conflict with this behavior or to use a different Filtering mode in the Personal firewall  Keep in mind  that if Gamer mode is enabled and you go to a webpage or an application that might be a security risk  it may be  blocked but you will not see any explanation or warning because user interaction is disabled     38    4 2 Network    The Personal firewall controls all network traffic to and from the system  This is accomplished by allowing or  denying individual network connections based on specified filtering rules  It provides protection against attacks  from remote computers and enables blocking of some services  It also provides antivirus protection for HTTP  POP3  and IMAP protocols  This functionality represents a very important element of computer security     Personal firewall configuration can be found in the Setup pane under Network  Here  you can adjust the filtering  mode  rules and detailed settings  You can also access more detailed settings of the program         e    ETSERI    SMART SECURITY v     lt  Setup Network            Home  P   x Network traffic filtering   Enabled    Block all network traffic  disconnect network  Q perc BDisable filtering  allow all traffic     Update Automatic filtering mode   Enabled      switch to interactive filtering mode  Configure rules and zones       i Change the protection mode of your computer in the network
179. on your computer or suspicious site on the Internet  you  can submit it to the ESET Virus Lab for analysis  If the file turns out to be a malicious application or website  its  detection will be added to an upcoming update     Alternatively  you can submit the file by email  If you prefer this option  pack the file s  using WinRAR ZIP  protect  the archive with the password  infected  and send it to samples eset com  Please remember to use a descriptive  subject and enclose as much information about the file as possible  for example  the website you downloaded it  from      NOTE  Before submitting a file to ESET  make sure it meets one or more of the following criteria     the file is not detected at all   e the file is incorrectly detected as a threat   You will not receive a response unless further information is required for analysis     Select the description from the Reason for submitting the file drop down menu that best fits your message     Suspicious file     Suspicious site  a website that is infected by any malware       False positive file  file that is detected as an infection but are not infected       False positive site     Other    File Site     The path to the file or website you intend to submit     Contact email     This contact email is sent along with suspicious files to ESET and may be used to contact you if  further information is required for analysis  Entering a contact email is optional  You will not get a response from  ESET unless more information
180. onsiderable time and effort that would otherwise be spent cleaning infiltrations  Here are some useful guidelines     e Do not visit suspicious websites with multiple pop ups and flashing advertisements    Be careful when installing freeware programs  codec packs  etc  Only use safe programs and only visit safe  Internet websites    Be cautious when opening email attachments  particularly those from mass mailed messages and messages from  unknown senders      Don t use an Administrator account for everyday work on your computer     2  Installation    There are several methods for installing ESET Smart Security on your computer  Installation methods may vary  depending on country and means of distribution     e Live installer can be downloaded from the ESET website  The installation package is universal for all languages   choose a desired language   Live installer itself is a small file  additional files required to install ESET Smart  Security will be downloaded automatically     e Offline installation    This type of installation is used when installing from a product CD DVD  It uses an  msi file  that is larger than the Live installer file and does not require an internet connection or additional files for the  completion of installation     Important  Make sure that no other antivirus programs are installed on your computer before you install ESET Smart  Security  If two or more antivirus solutions are installed on a single computer  they may conflict with each other   We
181. oriet notte etn rtis enero ops stor UPS ucen vd 10  Entering username and password                           eese 11  Upgrading to a more recent version                            esee 11  First scan after installation                               eere 12    Beginner s guide                                       13    The main program window                            eeeeeceeee eren teen 13    RDLrorl E                              15  Trusted zone setup                  reae eeeeee eene teen enean ensnanac 16  Lu 17  Parental control tools                          eere esten tete tata atat 17  Work with ESET Smart Security                  18     Tunc qmm                            19  4 1 1 Antivirus and antispyware                seseeemme 20  4 1 1 1 Real time file system protection                   eesseseeeees 20  4 1 1 1 1 Advanced scan options                    eeeeeeeeeeeeeeeeeeeeen i 21  41 1 12  Cleaning   levels             rera eoe nce eene e roue 22  4 1 1 1 3 When to modify real time protection configuration        23  4 1 1 1 4 Checking real time protection                         eesseeeeeeeess 23  4 1 1 1 5 Whatto doifreal time protection does not work           23  4 1 1 2 COMPUTER SCAMS snanar anran EL EE E DEERAS 23  4 1 12 1     CuUStOmS Can launcher    eiiis reto sardo ide E ataca denen 24  4 1 1 2 2  SCAM DrOBl 8S  secesssp e eepe cesa tat FATE e CER CH eg Pon ELE NER EVA S e AgT 25  41 122 3 Scan profiles  one carere de xp eaae 26  4 1 1 3 Startup
182. osoft   Windo    Mf  x Tools im Ism exe a 2 years ago Microsoft   Windo      a  svchost exe w 2 years ago Microsoft   Windo     WA vboxservice exe v 1yearago Oracle VM VirtualBo           Help and support     spoolsv exe   2 years ago Microsoft   Windo     filezilla server exe e 1year ago FileZilla Server   n  taskhost exe a 2 years ago Microsoft   Windo      a  sppsvc exe e 2 years ago Microsoft   Windo      a dwm exe a 2 years ago Microsoft amp  Windo     ie G explorer exe e 2 years ago Microsoft amp  Windo        A vb oxtray exe   1year ago Oracle VM VirtualBo      B snagit32 exe 9 1year ago Snagit m  File  c  windows system32 Isass exe  File size  22 0 kB  File description  Local Security Authority Process  Company name  Microsoft Corporation  File version  6 1 7600 16385  win7_rtm 090713 1255   es  eT Product name  Microsoft   Windows   Operating System          Process     Image name of the program or process that is currently running on your computer  You can also use the  Windows Task Manager to see all running processes on your computer  You can open Task Manager by right clicking  an empty area on the taskbar and then clicking Task Manager  or by pressing Ctrl Shift Esc on your keyboard     Risk level     In most cases  ESET Smart Security and ESET Live Grid technology assign risk levels to objects  files   processes  registry keys  etc   using a series of heuristic rules that examine the characteristics of each object and  then weigh their potential for malicious a
183. ot recommended      Click Next to configure your Internet connection  If you use a proxy server  it must be correctly configured for virus  signature updates to work  If you are not sure whether you use a proxy server to connect to the Internet  select Use  the same settings as Internet Explorer  Recommended  and click Next  If you do not use a proxy server  select   do  not use a proxy server     To configure your proxy server settings  select   use a proxy server and click Next  Enter the IP address or URL of your  proxy server in the Address field  In the Port field  specify the port where the proxy server accepts connections   3128 by default   In the event that the proxy server requires authentication  enter a valid Username and Password  to grant access to the proxy server  Proxy server settings can also be copied from Internet Explorer if desired  To do  this  click Apply and confirm the selection     Custom installation allows you to define how automatic program updates will be handled on your system  Click  Change    to access Advanced settings     If you do not want program components to be updated  select Never update program components  Select Ask  before downloading program components to display a confirmation window each time the system attempts to  download program components  To download program component upgrades automatically  select Always update  program components     NOTE  After a program component update  a restart is usually required  We recommend sele
184. otection Address range  10 2 1 1  10 2 1 10    B Web access protection Subnet  192 168 1 0   255 255 255 0  J E Protocol filtering IPv6 address  fe80  b434 b801 e878 5795  i Exduded applications IPv6 subnet  2001 218 420     64    Exduded IP addresses       H E SSL  Anti Phishing protection   tl Parental control   H O Update   H B User interface                                     Q  Search          4 3 3 3 1 Add IPv4 address    This allows you to add an IP address address range subnet of a remote point to which a rule is applied  Internet  Protocol version 4is the older but still the most widely used     Single address     Adds the IP address of an individual computer for which the rule is to be applied  for example  192 168 0 10      Address range     Enter the starting and ending address IP address to specify the IP range  of several computers  for  which the rule is to be applied  for example 192 168 0 1 to 192  168 0 99      Subnet     Subnet  a group of computers  defined by an IP address and mask     For example  255 255 255 0 is the network mask for the 192 168  1 0 24 prefix  that means 192 168 1 1 to  192 168  1 254 address range     4 3 3 3 2 Add IPv6 address    This allows you to add an IPv6 address subnet of a remote point for which the rule is applied  It is the newest  version of the Internet protocol and will replace the older version 4     Single address     Adds the IP address of an individual computer for which the rule is to be applied  for example  2001 7
185. otocol is designed for one   way communication requiring no authentication  This enables remote attackers to trigger so called DoS  Denial of  Service  attacks  or attacks which give unauthorized individuals access to incoming and outgoing packets     Typical examples of an ICMP attack are ping flood  ICMP ECHO flood and smurf attacks  Computers exposed to the  ICMP attack are significantly slower  this applies to all applications using the Internet  and have problems  connecting to the Internet     6 3 ESET Technology    6 3 1 Exploit Blocker    Exploit Blocker is designed to fortify commonly exploited application types such as web browsers  PDF readers   email clients and MS Office components  It works by monitoring the behavior of processes for suspicious activity  that might indicate an exploit     When Exploit Blocker identifies a suspicious process  it can stop the process immediately and record data about the  threat  which is then sent to the ESET Live Grid cloud system  This data is processed by the ESET Threat Lab and used  to better protect all users from unknown threats and zero day attacks  newly released malware for which there is  no pre configured remedy      6 3 2 Advanced Memory Scanner    Advanced Memory Scanner works in combination with Exploit Blocker to strengthen protection against malware  that has been designed to evade detection by antimalware products through the use of obfuscation and or  encryption  In cases where ordinary emulation or heuristics 
186. ouble click any log entry to display its  details in a separate window     Events     All important actions performed by ESET Smart Security are recorded in the event log  The eventlog  contains information about events and errors that have occurred in the program  It is designed for system  administrators and users to solve problems  Often the information found here can help you find a solution for a  problem occurring in the program     Computer scan     Results of all completed manual or planned scans are displayed in this window  Each line  corresponds to a single computer control  Double click any entry to view details of the respective scan     HIPS     Contains records of specific HIPS rules which were marked for recording  The protocol shows the  application that triggered the operation  the result  whether the rule was permitted or prohibited  and the  created rule name     Personal firewall     The firewall log displays all remote attacks detected by the Personal firewall  Here you will  find information about any attacks on your computer  The Event column lists the detected attacks  The Source  column tells you more about the attacker  The Protocol column reveals the communication protocol used for the  attack  Analysis of the firewall log may help you to detect system infiltration attempts in time to prevent  unauthorized access to your system     Filtered websites     This list is useful if you want to view a list of websites that were blocked by Web access  prot
187. our computer  Many infiltrations try to obtain and send private data  or download other malicious applications to  host workstations  The Personal firewall allows you to detect and terminate such connections     Display information about application allows you to define how applications will be displayed in the list of rules   The following options are available       Full path     Full path to the application s executable     Description     Description of the application     Name    Name of the application s executable     42    Select what type of rules will be displayed in the Rules setup section using the Rules to display list       Only user defined rules     Displays only those rules created by the user     User and predefined rules     Displays all user defined and default pre defined rules     All rules  including system      All rules are displayed     4 2 3 1 Rules setup    Rules setup allows you to view all rules applied to traffic generated by individual applications within trusted zones  and the Internet  By default  rules are added automatically according to user reactions to a new communication  To  view more information about an application at the bottom of this window  click the name of the application                 Rules  Zones    Rules define how the firewall will handle network communication  Rules can allow or deny particular applications  remote computers and  specific ports communication  For more information about rules  click here                  
188. ple  restarting the server  automatically after a program upgrade could cause serious damage     If the Ask before downloading update option is selected  a notification will display when a new update is available     If the update file size is greater than the value specified in the Ask if an update file is greater than field  the  program will display a notification     The Regularly check for latest product version option will enable the Regular checking for latest product version  scheduled task  see Scheduler      72    4 5 1 2 2 Proxy server    To access the proxy server setup options for a given update profile  click Update in the Advanced setup tree  F5   and then click Setup    to the right of Advanced update setup  Click the HTTP Proxy tab and select one of the three  following options       Use global proxy server settings    Do not use proxy server    Connection through a proxy server    Selecting the Use global proxy server settings option will use the proxy server configuration options already  specified in the Tools    Proxy server branch of the Advanced setup tree     Select Do not use proxy server to specify that no proxy server will be used to update ESET Smart Security   The Connection through a proxy server option should be selected if       A proxy server should be used to update ESET Smart Security that is different from the proxy server specified in  the global settings  Tools    Proxy server   If so  the settings should be specified here  Proxy server a
189. pted channel to transfer  information between server and client  ESET Smart Security checks communications utilizing the SSL  Secure Socket  Layer   and TLS  Transport Layer Security  encryption methods  HTTPS checking can be performed in the following  modes     Do not use HTTPS protocol checking     Encrypted communication will not be checked     Use HTTPS protocol checking for selected ports     The program will only check those applications that are specified  in the Web and email clients section and that use ports defined in Ports used by HTTPS protocol  Port 443 is set by  default     Encrypted communication will be not scanned  To enable the scanning of encrypted communication and view the  scanner setup  navigate to SSL protocol checking in Advanced setup section  click Web and email  gt  Protocol filtering   gt  SSL and enable the Always scan SSL protocol option     57    4 3 2 2 URL address management    The URL address management section enables you to specify HTTP addresses to block  allow or exclude from  checking  Add  Edit  Remove and Export are used to manage the lists of addresses  Websites in the list of blocked  addresses will not be accessible  Websites in the list of excluded addresses are accessed without being scanned for  malicious code  If you select Allow access only to URL addresses in the list of allowed addresses  only addresses  present in the list of allowed addresses will be accessible  while all other HTTP addresses will be blocked     If you 
190. puter  The Update module ensures that the program is always up to date in two ways  by updating the virus  signature database and by updating system components     By clicking Update in the main program window  you can view current update status including the date and time of  the last successful update and if an update is needed  The primary window also contains the virus signature  database version  This numeric indicator is an active link to ESET s website  listing all signatures added within the  given update     In addition to automatic updates  you can click Update now to trigger an update manually  Updating the virus  signature database and updating program components are important parts of maintaining complete protection  against malicious code  Please pay attention to their configuration and operation  If you did not enter your License  details  Username and Password  during installation  you can enter your Username and Password when updating to  access ESET s update servers     NOTE  Your Username and Password are provided by ESET after purchasing ESET Smart Security     68               SMART SECURITY          Update    The virus signature database is up to date    Update is not necessary   the virus signature database is up to date     Last successful update  2  7  2013 11 08 00  Virus signature database version  8515  20130702     e    Product update  Installed version  7 0 30 0    Check for updates    Last successful update     The date of the last update  If yo
191. r is a reliable vendor  consult the original product manufacturer      e Some of the words are misspelled in an attempt to trick your spam filter  For example  vaigra  instead of  viagra    etc     6 4 4 1 Rules    In the context of Antispam solutions and email clients  rules are tools for manipulating email functions  They  consist of two logical parts     1  Condition  e g   an incoming message from a certain address   2  Action  e g   deletion of the message  moving it to a specified folder     The number and combination of rules varies with the Antispam solution  These rules serve as measures against  spam  unsolicited email   Typical examples     e 1  Condition  An incoming email message contains some of the words typically seen in spam messages  2  Action  Delete the message      1  Condition  An incoming email message contains an attachment with an  exe extension  2  Action  Delete the attachment and deliver the message to the mailbox      1  Condition  An incoming email message arrives from your employer  2  Action  Move the message to the  Work  folder    We recommend that you use a combination of rules in Antispam programs in order to facilitate administration and  to more effectively filter spam     118    6 4 4 2 Whitelist    In general  a whitelist is alist of items or persons who are accepted  or have been granted permission  The term     email whitelist    defines a list of contacts from whom the user wishes to receive messages  Such whitelists are  based on ke
192. r this  error is incorrectly entered authentication data or incorrectly configured connection settings     The previous notification is related to the following two Virus signature database update ended with an error  messages about unsuccessful updates     1  Invalid Username and or Password     The Username and Password have been incorrectly entered in update  setup  We recommend that you check your authentication data  The Advanced setup window  click Setup from  the main menu and then click Enter advanced setup     or press F5 on your keyboard  contains additional update  options  Click Update    Settings in the Advanced setup tree to enter a new Username and Password     2  An error occurred while downloading update files     A possible cause of the error is incorrect Internet connection  settings  We recommend that you check your Internet connectivity  by opening any website in your web  browser   If the website does not open  itis likely that an Internet connection is not established or there are  connectivity problems with your computer  Please check with your Internet Service Provider  ISP  if you do not  have an active Internet connection                 SMART SECURITY v    Update           A Home     s      A Virus signature database update ended with an error  Download interrupted by user   Q Computer scan  Troubleshoot update issue    Update A OK    OE Setup  x Tools   e  Product update  Installed version  7 0 30 0        Help and support    Check for updates    
193. ra 61  4 3 3 4 SSL protocol checking    ee eerte ctetu 62  4 3 3 4 1  CertifiCates iei eee ism a tari rein bbb Roa pRbtR rti nidi e Et Peto ins 62  4 3 3 4 1 1 Trusted certificates    usse iiio seva an Cera epe 62  4 3 3 4 1 2 Excl  d  d certificates    ertet chi vars vavanaapnavecneyed 63  4 3 3 4 1 3 Encrypted SSL communication                        eseeeeeeeesss 63  4 3 4 Anti Phishing protectlOri           cere radere eene 63  Parental control                    eese essei ee setenta tates tnn ta tenta 64  4 4 1 Web page content filtering                 sssesesseeeeenene 67  4 4 2 Blocked and allowed web pages                     eeeeeees 68  Updating the program                      e eeeeeeee eee ee teen ete te tnn ta inanes 68  4 5 1 Update settings iude iene e erede iore Dore sa rada 71  4 5 1 1 Update profiles    i eene t na pner rna dra 72  4 5 1 2 Advancediupdate setup            2  eic eteeens 72  45 121 Update mode        4 4 4  eere rd e Gas etate 72   51 2 2  PrO SEMNE cocsiscussdsinesacinisssascesnssaiiaiadicndedadiaciaanacennsaesans 73  4 5 1 2 3   Connecting to the LAN    osos tino oe tetto ren rp reor iic 73    Update rollbatck  s ci erobern aa 74    How to create update tasks srren 75       4 7    S     5 1  5 2  5 3  5 4  5 5  5 6    5 7           4 6 3 Protection statistics    ioc n tarii ea rc 79  4 6 4 Watek ae VIEN nisi icruti esas raso lebe eor rera brevet Ese idet sius 79  4 6 5 ESET Sys Ine DOCEOER ionnann 80  4 6 6 ESET Live Grid    inerenti een
194. re are several possible reasons this status may be displayed  for example       Anti Theft optimization warning     This device is not optimized for ESET Anti Theft  For example  a    14    Phantom account does not exist initially  but is a security feature that is triggered automatically when you  mark a device as missing  You may need to create a Phantom account using the Optimization feature in  the ESET Anti Theft web interface       Gamer mode enabled     Enabling Gamer mode is a potential security risk  By enabling this feature  all pop   up windows are disabled and the activity of the scheduler will be completely stopped     e Your license will expire soon    This is indicated by the protection status icon displaying an exclamation  point next to the system clock  After your license expires  the program will not be able to update and the  Protection status icon will turn red     If you are unable to solve a problem using the suggested solutions  click Help and support to access the help files or  search the ESET Knowledgebase  If you still need assistance  you can submit a support request  ESET Customer Care  will respond quickly to your questions and help find a resolution     3 2 Updates    Updating the virus signature database and updating program components is an important part of protecting your  system against malicious code  Pay careful attention to their configuration and operation  In the main menu  click  Update and then click Update now to check for a virus 
195. rental control Set password       from modification  Qo Update  m  petko  28 years    Enabled    IE setup Setup     Tool      X      EM jozko  9 years    Enabled  Setup               Help and support  Mary Not defined  John Not defined    di  Sca cota fone nae                If you click Parental control in the Setup pane from the main product window of ESET Smart Security  you will see  that the main window is divided into three sections     1  Parental control    After deselecting Enabled on the right  a Temporarily disable protection window will appear  Here you can set the  time interval for which protection is disabled  The option then changes to Disabled and all following settings will be  hidden     It is important to protect the settings in ESET Smart Security with a password  This password can be set in the Access  setup section  If no password is set the following warning will appear underthe Parental control option     Password  for Advanced setup is required to protect Parental control from modification  Set password    will be visible  The  restrictions set in Parental control only affect the standard user accounts  Because an Administrator can override  any restriction  they will not have any effect     HTTPS  SSL  communication is not filtered by default  Therefore  Parental control cannot block web pages that begin  with https     To enable this feature  select Enable next to the Filtering of encrypted  HTTPS  websites is not  enabled warning message  or selec
196. ribed above     e Copy all     Copies information about all the records in the window    e Delete Delete all     Deletes the selected record s  or all the records displayed  this action requires administrator  privileges    e Export     Exports information about the record s  in XML format    Don t block similar events in the future     This option is visible in firewall log only  Adds an IDS exception from   selected activity to Personal firewall    e Scroll log     Leave this option enabled to auto scroll old logs and watch active logs in the Log files window     4 6 1 1 Log maintenance    The Logging configuration of ESET Smart Security is accessible from the main program window  Click Setup    Enter  advanced setup     gt  Tools  gt  Log files  The logs section is used to define how the logs will be managed  The program  automatically deletes older logs in order to save hard disk space  You can specify the following options for log files     Minimum logging verbosity     Specifies the minimum verbosity level of events to be logged       Diagnostic     Logs information needed to fine tune the program and all records above      Informative     Records informative messages  including successful update messages  plus all records above     Warnings     Records critical errors and warning messages      Errors     Errors such as  Error downloading file  and critical errors will be recorded    e Critical     Logs only critical errors  error starting Antivirus protection  Personal
197. rogram filters out all items less risky than current risk level and only display  items which are more suspicious than the displayed level  With the slider all the way to the right  the program  displays only known harmful items     All items labeled as risk 6to 9 can pose a security risk  If you are not using a security solution from ESET  we  recommend that you scan your system with ESET Online Scanner if ESET SysInspector has found any such item  ESET  Online Scanner is a free service     NOTE  The Risk level of an item can be quickly determined by comparing the color of the item with the color on the  Risk Level slider     Compare   When comparing two logs  you can choose to display all items  display only added items  display only removed  items or to display only replaced items    Find   Search can be used to quickly find a specific item by its name or part of its name  The results of the search request  are displayed in the Description window    Return   By clicking the back or forward arrows  you can return to previously displayed information in the Description  window  You can use the backspace and space keys instead of clicking back and forward    Status section    Displays the current node in Navigation window     Important  Items highlighted in red are unknown  which is why the program marks them as potentially dangerous  If  an item is in red  it does not automatically mean that you can delete the file  Before deleting  please make sure that  files are really dan
198. ruis  45  4 2 4 Configuring zones                 45  4 2 4 1 Network authentication       46  4 2 4 1 1 Zone authentication   Client configuration     46  4 2 4 1 2 Zone authentication   Server configuration                     48  4 2 5 Establishing connection   detection                         sssss 49  4 2 6 LOBBING ET              50  4 2 7 System IWtegkatiTlcsoxesvave ey aas e AREE Pa Yo bxn ui n n Pa EE SEE Ra EE 50  Web and email                    eese esten tette tatnen tnnt ttntnnas 51  4 3 1 Email client protection           4 52  4 3 1 1 Integration with email clients                 52  4 3 1 1 1 Email client protection configuration       53  4 3 1 2 IMAP  IMAPS scanner                    eeeseees  53  4 3 1 3 POP3  POP3S filter     54  4 3 1 4 Antispam DROCOCHON uirsiissssceacssasssacoaacesnsmnastarsoasateseiaceds 55  4 3 1 4 1 Adding addresses to whitelist and blacklist                    56  4 3 1 4 2 Marking messages as SPAM          ccceeeeeeeeeeeeeeeeeeteeeaeeanees 56  4 3 2 WED ACCESS  protectio seniore to ioo eor kt en senate us 57  4 3 2 1 HTTP  LR            57  4 3 2 2 URL  address management                 cerne 58  4 3 3 Protocolfilteritig  iioi o repe aO aE peius 59  4 3 3 1 Web and email clients                 eeseeeeeen m 59  4 3 3 2 Excluded applicatioris             rini cerent 60  4 3 3 3 Excluded IP addresses          nine etti tte 61  4 3 3 3 1  Add IPVA address    iscritte eon rne rna aS EENS 61  43 332   AAGPVG address  recorrer eret e
199. s below     2  Manually  in the main program window by clicking Install Check for updates in the Update section     3  Manually  by downloading and installing a more recent version over the previous one     11    2 6 First scan after installation    After installing ESET Smart Security  a computer scan will start 20 minutes after installation or computer restart in  order to check for malicious code     You can also start a computer scan manually from the main program window by clicking Computer scan  gt  Smart scan   For more information about computer scans  see the section Computer scan                SMART SECURITY    Threats found  0   Objects cleaned  0   Scanning  C  Program Files ESET ESET Smart Security ekrnSmonLang dil  Open scan in a new window      After all scans computer takes no action v    Smart scan   Custom scan        Local disk scan Ia Selection of scan profile and targets  to scan         Removable media scan Q Repeat last scan  a Scanning of USB  DVD  CD and other Q Date and time of the last scan     removable media 2  7  2013 12 11 58    B Scan logs      Computer scan setup          12       3  Beginner s guide    This chapter provides an initial overview of ESET Smart Security and its basic settings     3 1 The main program window    The main program window of ESET Smart Security is divided into two main sections  The primary window on the  right displays information that corresponds to the option selected from the main menu on the left     The followi
200. sed to ensure the  most efficient scanning level  while simultaneously maintaining the highest scanning speeds  The various  protection modules scan intelligently  making use of different scanning methods and applying them to specific file  types  If the Smart Optimization is disabled  only the user defined settings in the ThreatSense core of the particular  modules are applied when performing a scan     When configuring ThreatSense engine parameters setup for a Computer scan  the following options are also  available     Scan alternate data streams  ADS      Alternate data streams used by the NTFS file system are file and folder  associations which are invisible to ordinary scanning techniques  Many infiltrations try to avoid detection by  disguising themselves as alternate data streams     Run background scans with low priority     Each scanning sequence consumes a certain amount of system resources   If you work with programs that place a high load on system resources  you can activate low priority background  scanning and save resources for your applications     Preserve last access timestamp    Select this option to keep the original access time of scanned files instead of  updating them  for example  for use with data backup systems      Scroll scan log     This option allows you to enable disable log scrolling  If selected  information scrolls upwards  within the display window     4 1 1 7  An infiltration is detected   Infiltrations can reach the system from various e
201. selected     If Real time protection does not detect and clean infiltrations    Make sure that no other antivirus programs are installed on your computer  If two real time protection shields are  enabled at the same time  they may conflict with each other  We recommend that you uninstall any other antivirus  programs on your system before installing ESET     Real time protection does not start    If real time protection is not initiated at system startup  and Start Real time file system protection automatically is  enabled   it may be due to conflicts with other programs  For assistance resolving this issue  please contact ESET  Customer Care     4 1 1 2 Computer scan    The on demand scanner is an important part of your antivirus solution  It is used to perform scans of files and  folders on your computer  From a security standpoint  it is essential that computer scans are not just run when an  infection is suspected  but regularly as part of routine security measures  We recommend that you perform regular  in depth scans of your system to detect viruses that are not captured by Real time file system protection when they  are written to the disk  This can happen if Real time file system protection is disabled at the time  the virus  database is obsolete orthe file is not detected as a virus when itis saved to the disk     Two types of Computer scan are available  Smart scan quickly scans the system with no need for further  configuration of the scan parameters  Custom scan a
202. ses from existing email client accounts     6 4 4 5 Server side control    Server side control is a technique for identifying mass spam based on the number of received messages and the  reactions of users  Each message leaves a unique digital    footprint    based on the content of the message  The  unique ID number tells nothing about the content of the email  Two identical messages will have identical  footprints  while different messages will have different footprints     If a message is marked as spam  its footprint is sent to the server  If the server receives more identical footprints   corresponding to a certain spam message   the footprint is stored in the spam footprints database  When scanning  incoming messages  the program sends the footprints of the messages to the server  The server returns information  on which footprints correspond to messages already marked by users as spam     119    
203. signature database update     If the Username and Password were not entered during the activation of ESET Smart Security you will be prompted  for them at this point        var     ESET Smart Security c   C  mc  SMART SECURITY v  Update   4S Home               The virus signature database is up to date   Update is not necessary   the virus signature database is up to date   Q Computer scan   Last successful update  2  7  2013 11 08 00   Virus signature database version  8515  20130702   Q o   Update now    I Setup  x Tools   e  Product update    Installed version  7 0 30 0  o Help and support  Check for updates          15    The Advanced setup window  click Setup in the main menu and then click Enter advanced setup     or press F5 on  your keyboard  contains additional update options  Click Update  gt  Settings in the Advanced setup tree to the left     To configure advanced update options such as update mode  proxy server access and LAN connections  click Setup     in the Update window                                                      e  art Se Ex  Advanced setup Ger  A Computer Selected profile   ii Network My profile      Profiles           Web and email B  oO Pacnidustd Update settings for selected profile   Q Update Username  Password   EAV 12345678  LITIITIIIIIN  Update rollback I E  X Tools   Regular update    Pre release update  98 User interface Advanced update setup  Setup     Clear update cache  Clear     Do not display notification about successful update  Q S
204. some viruses do not cause any damage     they  only serve to annoy the user and demonstrate the technical skills of their authors     If your computer is infected with a virus and cleaning is not possible  submit it to the ESET lab for perusal  In certain  cases infected files can be modified to such an extent that cleaning is not possible and the files must be replaced  with a clean copy     6 1 2 Worms    A computer worm is a program containing malicious code that attacks host computers and spreads via network  The  basic difference between a virus and a worm is that worms have the ability to propagate by themselves  they are  not dependant on host files  or boot sectors   Worms spread to email addresses in your contact list or exploit  security vulnerabilities in network applications     Worms are therefore much more viable than computer viruses  Due to the wide availability of the Internet  they  can spread across the globe within hours or even minutes after their release  This ability to replicate independently  and rapidly makes them more dangerous than other types of malware     A worm activated in a system can cause a number of inconveniences  It can delete files  degrade system  performance  or even deactivate programs  The nature of a computer worm qualifies it as a    means of transport  for  other types of infiltrations     If your computer is infected with a worm  we recommend you delete the infected files because they likely contain  malicious code     6 1 3 Tro
205. sses All All All J  v Allow com    49 TCP amp    IP  127 0 0 1 1    All All  E  Host Process for Windows Service  W  Allow mult      UDP IP subnet 224     All All     Host Process for Windows Service  Iv  Allow com    49 TCP  amp    IP  127 0 0 1 1    All All m  Windows Logon User Interface       W   Alowinbo    9 TCP  amp    Local addresses  All All All  W   AlowDH    49 UDP All 67 68 67  68  E  Host Process for Windows Service   V  AllowDH    49 UDP All 67 68 67  68  87  Services and Controller app  ri Allow DH    19 UDP IPv6 subnet fe    546   547 546   547 E Host Process for Windows Service  v Allow out    f TCP  amp  All All DNS  53   E  Host Process for Windows Service   V  Block inco     amp  UDP All 5355 All All  W  Blockout    T UDP All All 5355 All  v Allow time    49 UDP Trusted zone Ntp  123  Ntp  123         Host Process for Windows Service E   rz all    Toa An Tan m L i nna an an an       m J     New Edit Delete  Del      A       Name     Name of rule  check box must be selected to activate the rule     Action     Shows the direction of communication and action     T Outgoing connections are allowed   T Outgoing connections are blocked     Incoming connections are allowed     Incoming connections are blocked      All connections are allowed   4   All connections trigger a dialog window prompting you to select allow or deny  14 All connections are blocked    Protocol   Communication protocol    Address     Address of remote computer    Local port     Port of loca
206. stallation process is to configure detection of potentially unwanted applications  Potentially  unwanted applications are not necessarily malicious  but can negatively affect the behavior of your operating  system  See the Potentially unwanted applications chapter for more details     Click Next to start the installation process     2 2 Offline installation    Once you launch the offline installation   msi  package  the installation wizard will guide you through the setup  process        Welcome to ESET Smart    Security Setup Wizard    The Setup Wizard will install ESET Smart Security on your  computer  Click Next to continue or Cancel to exit the Setup  Wizard     It is important that you uninstall any other security  applications such as antivirus  antispyware or firewall before  you continue with the installation  They can conflict with this  product  possibly resulting in serious problems              First  the program checks to see if a newer version of ESET Smart Security is available  If a newer version is found  you will be notified in the first step of the installation process  If you select Download and install new version  the  new version will be downloaded and installation will continue  This check box is visible only when there is a  version newer than the version you are installing available     Next  the End User License Agreement will be displayed  Please read the agreement and click Accept to  acknowledge your acceptance of the End User License Agreement  
207. sword generated and sent to you after  purchase  By default  no verification is required and the Username and Password fields are left empty     Pre release updates  the Pre release update option  are updates that have gone through thorough internal testing  and will be available to the general public soon  You can benefit from enabling pre release updates by having  access to the most recent detection methods and fixes  However  pre release updates might not be stable enough  at all times and SHOULD NOT be used on production servers and workstations where maximum availability and  stability is required  The list of current modules can be found in Help and support  gt  About ESET Smart Security  It is  recommended that basic users leave the Regular update option selected by default     Click Setup    next to Advanced update setup to display a window containing advanced update options   If you experience problems with an update  click Clear to delete temporary update files     Do not display notification about successful update     Turns off the system tray notification at the bottom right  corner of the screen  It is useful to select this option if a full screen application or a game is running  Please note  that Gamer mode will disable all notifications     71    4 5 1 1 Update profiles    Update profiles can be created for various update configurations and tasks  Creating update profiles is especially  useful for mobile users who need an alternative profile for Internet con
208. t     Examples of well known freeware products which come bundled with spyware are client applications of P2P  peer   to peer  networks  Spyfalcon or Spy Sheriff  and many more  belong to a specific spyware subcategory     they  appear to be antispyware programs  but in fact they are spyware programs themselves     If a file is detected as spyware on your computer  it is advisable to delete it  since there is a high probability that it  contains malicious code     113    6 1 7 Packers    Packer is a runtime self extracting executable that rolls up several kinds of malware into a single package     The most common packers are UPX  PE Compact  PKLite and ASPack  The same malware may be detected  differently when compressed using a different packer  Packers also have the ability to make their  signatures   mutate over time  making malware more difficult to detect and remove     6 1 8 Potentially unsafe applications    There are many legitimate programs whose function is to simplify the administration of networked computers   However  in the wrong hands  they may be misused for malicious purposes  ESET Smart Security provides the option  to detect such threats     Potentially unsafe applications is the classification used for commercial  legitimate software  This classification  includes programs such as remote access tools  password cracking applications  and keyloggers  a program that  records each keystroke a user types      If you find that there is a potentially unsafe appli
209. t Always scan SSL protocol in Advanced setup    Web and email    Protocol  filtering    SSL configuration section     Note  Parental control requires Application protocol content filtering  HTTP protocol checking and Personal firewall  system integration to be enabled in order to function properly  All of these functionalities are enabled by default     2  Windows user accounts    If you have created a role for an existing account  it will be shown here with the Enabled attribute  Clicking Enabled  will toggle Parental control for the account  Under an active account  click Setup    to see the list of allowed  categories of web pages for this account and blocked and allowed web pages     Important  To create a new account  for example  for a child   use the following step by step instructions for  Windows 7 or Windows Vista     65    1  Open User Accounts by clicking the Start button  located at the bottom left side of your desktop   clicking Control    Panel and then clicking User Accounts    2  Click Manage another account  If you are prompted for an administrator password or confirmation  type the  password or provide confirmation    3  Click Create a new account      Type the name you want to give the user account  click an account type  and then click Create Account    5  Reopen the Parental control pane by clicking again from the main program window of ESET Smart Security to  Setup  gt  Parental control     B    3  The last section contains two options    Set exception 
210. t correspond with the authentication server zone  Review both zones and ensure  their names are identical     Server authentication failed  Server address not found in the list of addresses for the given zone   The IP address of the computer running the authentication server is outside the defined IP address range of the  current zone configuration     Server authentication failed  Probably an invalid public key was entered    Verify that the public key specified corresponds to the private server key  Also verify that the public key file is not  corrupted    2  By local network configuration    Authentication is performed based on the local network adapter parameters  A zone is authenticated if all selected  parameters for the active connection are valid     47                                                                                                                                        Authentication will succeed if all selected conditions for the active connection are met  Both IPv4 and IPv6  addresses are allowed  Multiple addresses are separated with a semicolon    Adapter configuration to fulfill    P  ipojen   k m  stn   siti v    Populate with selected connection settings     General adapter settings  7 When eE suffix is  example  A e  hq eset com  V  When DNS server s IP address is  V  When the local IP address is   10  1 96  106  10  1 96  107 10  1 108 94 fe80  9934 7a0c ac5d 82cb  V   When DHCP server s IP address is      When gateway s IP address is   10 1 
211. the application stops unexpectedly   A complete memory dump may contain data from processes that were running when the memory dump was  collected      Minidump     Records the smallest set of useful information that may help identify why the application crashed  unexpectedly  This kind of dump file can be useful when space is limited  However  because of the limited  information included  errors that were not directly caused by the thread that was running at the time of the  problem may not be discovered by an analysis of this file      Select Do not generate memory dump  default  to disable this feature     Target directory     Directory where the dump during the crash will be generated  Click     to open this directory  within a new Windows explorer window     5 4 Import and export settings    You can import or export your customized ESET Smart Security  xml configuration file from the Setup menu     Importing and exporting of configuration files is useful if you need to backup your current configuration of ESET  Smart Security for use at a later time  The export settings option is also convenient for users who want to use their  preferred configuration on multiple systems  they can easily import an  xml file to transfer these settings     Importing a configuration is very easy  In the main program window click Setup  gt  Import and export settings     and  then select Import settings  Enter the file name of the configuration file or click the     button to browse for the  
212. the user to compare two existing logs  The outcome of this feature is a set of items not  common to both logs  It is suitable if you want to keep track of changes in the system  a helpful tool for detecting  malicious code     After it is launched  the application creates a new log which is displayed in anew window  Click File  gt  Save log to  save a log toa file  Log files can be opened and viewed at a later time  To open an existing log  click File  gt  Open log   In the main program window  ESET SysInspector always displays one log at a time     The benefit of comparing two logs is that you can view a currently active log and a log saved in a file  To compare  logs  click File  gt  Compare log and choose Select file  The selected log will be compared to the active one in the main  program windows  The comparative log will display only the differences between those two logs     NOTE  If you compare two log files  click File  gt  Save log to save it as a ZIP file  both files will be saved  If you open  this file later  the contained logs are automatically compared     Next to the displayed items  ESET SysInspector shows symbols identifying differences between the compared logs   Description of all symbols that can be displayed next to items     e    new value  not present in the previous log   tree structure section contains new values   e   removed value  present in the previous log only   tree structure section contains removed values   e   value   file has been changed  
213. tics on executing files from removable media     If you wish to exclude some removable media   USB  ports from being scanned by advanced heuristics on file execution  click Exceptions    to open the  removable media drive exclusions window  In this window  you can customize the settings by selecting or  deselecting the check boxes that represent each port     4 1 1 1 2 Cleaning levels    Real time protection has three cleaning levels  to access  click Setup    in the Real time file system protection  section and then click Cleaning      No cleaning     Infected files will not be cleaned automatically  The program will display a warning window and allow  the user to choose an action  This level is designed for more advanced users who know which steps to take in the  event of an infiltration     Standard cleaning     The program will attempt to automatically clean or delete an infected file based ona  predefined action  depending on the type of infiltration   Detection and deletion of an infected file is signaled by a  notification the bottom right corner of the screen  If it is not possible to select the correct action automatically  the  program provides other follow up actions  The same happens when a predefined action cannot be completed     Strict cleaning     The program will clean or delete all infected files  The only exceptions are the system files  If it is  not possible to clean them  the user is prompted to select an action by a warning window     Warning   f an arc
214. tificates for scanning SSL communication  This option is available if you select Always scan SSL protocol     Block encrypted communication utilizing the obsolete protocol SSL v2   Communication using the earlier version of  the SSL protocol will automatically be blocked     4 3 3 4 1 Certificates    For SSL communication to work properly in your browsers email clients  it is essential that the root certificate for  ESET be added to the list of known root certificates  publishers   Add the root certificate to known browsers should  be enabled  Select this option to automatically add the ESET root certificate to the known browsers  for example   Opera and Firefox   For browsers using the system certification store  the certificate is added automatically  e g   Internet Explorer   To apply the certificate to unsupported browsers  click View Certificate    Details    Copy to File     and then manually import it into the browser     In some cases  the certificate cannot be verified using the Trusted Root Certification Authorities store  e g   VeriSign   This means that the certificate is self signed by someone  e g  administrator of a web server or a small  business company  and considering this certificate as trusted is not always a risk  Most large businesses  for  example banks  use a certificate signed by TRCA  If Ask about certificate validity is selected  selected by default    the user will be prompted to select an action to take when encrypted communication is established
215. tifications when running applications  in full screen mode     To close pop up windows automatically after a certain period of time  select Close message boxes automatically  after  sec    If they are not closed manually  alert windows are automatically closed after the specified time period  elapses     Click Advanced setup to access additional Alerts and notification setup options     4 7 2 1 Advanced setup    From the Minimum verbosity of events to display drop down menu  you can select the starting severity level of  alerts and notification to be displayed       Diagnostic     Logs information needed to fine tune the program and all records above    Informative     Records informative messages  including successful update messages  plus all records above   Warnings     Records critical errors and warning messages    Errors     Errors such as  Error downloading file  and critical errors will be recorded    e Critical     Logs only critical errors  error starting Antivirus protection  Personal firewall  etc         The last feature in this section allows you to configure the destination of notifications in a multi user environment   The On multi user systems  display notifications on the screen of this user field specifies a user who will receive  system and other notifications on systems allowing multiple users to connect at the same time  Normally  this    89    would be asystem or network administrator  This option is especially useful for terminal servers  provided that
216. til the ESET SysInspector log is complete  Status shown as Created      Delete     Removes selected logs from the list     After right clicking one or more selected logs  the following options are available from the context menu     e Show    Opens the selected log in ESET SysInspector  same function as double clicking a log    e Delete all     Deletes all logs   e Export        Exports the log to an  xml file or zipped  xml     4 6 6 ESET Live Grid    ESET Live Grid  built on the ESET ThreatSense Net advanced early warning system  utilizes data that ESET users have  submitted worldwide and sends it to the ESET Virus Lab  By providing suspicious samples and metadata from the  wild  ESET Live Grid enables us to react immediately to needs of our customers and keep ESET responsive to the  latest threats  Read more about ESET Live Grid in the glossary     A user can check the reputation of running processes and files directly from the program s interface or contextual  menu with additional information available from ESET Live Grid  There are two options     1  You can choose not to enable ESET Live Grid  You will not lose any functionality in the software  but  in some  cases  ESET Smart Security may respond faster to new threats than virus signature database update    2  You can configure ESET Live Grid to submit anonymous information about new threats and where the new  threatening code is contained  This file can be sent to ESET for detailed analysis  Studying these threats wi
217. ting one of the following rights       Block     Access to the device will be blocked   e Read Only     Only reading access to the device will be allowed     Read Write     Full access to the device will be allowed     Note that not all rights  actions  are available for all device types  If a device has storage space  all three actions are  made available  For non storage devices  there are only two  for example Read Only is not available for Bluetooth    so Bluetooth devices can only be allowed or blocked      Other parameters that can be used to fine tune rules and tailor them to devices  All parameters are case   insensitive     e Vendor    Filtering by vendor name or ID   e Model  The given name of the device   e Serial number     External devices usually have their own serial numbers  In the case of a CD DVD  this is the serial    35    number of the given media  not the CD drive     Note  If the above three descriptors are empty  the rule will ignore these fields while matching  Filtering  parameters in all text fields are case sensitive and no wildcards        are supported  They must be written exactly  as delivered by the vendor     Tip  In order to figure out the parameters of a device  create an allowing rule for the appropriate type of devices   connect the device to your computer and then check the device details in the Device control log     Rules can be limited to certain users or user groups by adding them to the User list     e Add  Opens the Object type  Us
218. ts  But many companies send unsolicited bulk commercial messages  In such cases  email advertising crosses  the line and becomes spam     The amount of unsolicited email has become a problem and it shows no signs of slowing  Authors of unsolicited  email often attempt to disguise spam as legitimate messages     6 4 2 Hoaxes    A hoax is misinformation which is spread across the Internet  Hoaxes are usually sent via email or communication  tools like ICQ and Skype  The message itself is often a joke or Urban Legend     Computer Virus hoaxes try to generate fear  uncertainty and doubt  FUD  in the recipients  bringing them to believe  that there is an  undetectable virus  deleting files and retrieving passwords  or performing some other harmful  activity on their system     Some hoaxes work by asking recipients to forward messages to their contacts  perpetuating the hoax  There are  mobile phone hoaxes  pleas for help  people offering to send you money from abroad  etc  It is often impossible to  determine the intent of the creator     If you see a message prompting you to forward it to everyone you know  it may very well be a hoax  There are many  websites on the Internet that can verify if an email is legitimate  Before forwarding  perform an Internet search on  any message you suspect is a hoax     117    6 4 3 Phishing    The term phishing defines a criminal activity which uses techniques of social engineering  manipulating users in  order to obtain confidential information
219. ty  Information about the program   s expiration date can  also be found here under Basic overview     The green icon and green Maximum protection status indicates that maximum protection is ensured     What to do if the program doesn t work properly     If the modules enabled are working properly  the Protection status icon will be green  A red exclamation point or  orange notification indicates that maximum protection is not ensured  Additional information about the protection  status of each module  as well as suggested solutions for restoring full protection  will be displayed under Home  To  change the status of individual modules  click Setup and select the desired module         SJ SET Smart Security coe  SMART SECURITY    Maximum protection is     A Home P       not ensured   Q Computer scan      pose Antivirus and antispyware protection disabled   Some of the antivirus and antispyware protection modules were disabled by the user   Jk Setup Complete protection can be enabled here  Start all antivirus and antispyware protection    modules     ESET Anti Theft is available    d   Help and support Anti Theft tracks and locates your missing or stolen laptop  Enable Anti Theft and start  getting protected now     Enable ESET Anti Theft Do not remind me again    Frequently used Q Run Smart scan    Statistics  I  ESET Social Media Scanner      Enable Gamer mode             Basic overview License valid until  29  12  2014  j     ESET Smart Security status  Protection active  n
220. u do not see arecent date  your virus signature database    may not be current     Virus signature database version     The virus signature database number  which is also an active link to the ESET  website  Click it to view a list of all signatures added within the given update     Click Check for updates to detect the latest available version of ESET Smart Security     Update process    After clicking Update now  the download process begins  A download progress bar and remaining time to download  will be displayed  To interrupt the update  click Cancel update              SMART SECURITY     A Home    Q Computer scan     Update   3k Setup   X Tools   o Help and support          Update    Virus signature database update  Update progress  6 kB   0 kB  File name  update ver    Cancel update    Product update  Installed version  7 0 30 0    Check for updates    Important  Under normal circumstances  when updates are downloaded properly the message Update is not    69    necessary   Virus signature database is up to date will appear in the Update window  If this is not the case  the  program is out of date and more vulnerable to infection  Please update the virus signature database as soon as  possible  Otherwise  one of the following messages will be displayed     Virus signature database is out of date     This error will appear after several unsuccessful attempts to update the  virus signature database  We recommend that you check the update settings  The most common reason fo
221. uring the early spread of a new threat  It uses a combination of code  analysis  code emulation  generic signatures and virus signatures which work in concert to significantly enhance  system security  The scanning engine is capable of controlling several data streams simultaneously  maximizing the  efficiency and detection rate  ThreatSense technology also successfully eliminates rootkits     ThreatSense engine setup options allow you to specify several scan parameters       File types and extensions that are to be scanned   e The combination of various detection methods     Levels of cleaning  etc     To enter the setup window  click Setup    in the Advanced setup window for any module that uses ThreatSense  technology  see below   Different security scenarios may require different configurations  With this in mind   ThreatSense is individually configurable for the following protection modules       Real time file system protection     Document protection      Email client protection    e Web access protection      Computer scan     ThreatSense parameters are highly optimized for each module  and their modification can significantly influence  system operation  For example  changing parameters to always scan runtime packers  or enabling advanced  heuristics in the Real time file system protection module could result in a system slow down  normally  only  newly created files are scanned using these methods   We recommend that you leave the default ThreatSense  parameters unc
222. ute the script  the drivers selected will be stopped  Note that some drivers won t allow themselves  to be stopped     09  Critical files    This section contains information about files that are critical to proper function of the operating system     103    Example     09  Critical files      File  win ini      fonts       extensions       files      MAPI 1   L5      File  system ini      386Enh      woafont dosapp fon    EGA80WOA FON EGAB80WOA FON  Le      File  hosts     127 0 0 1 localhost      il localhost    5s     The selected items will either be deleted or reset to their original values     5 6 4 3 Executing Service scripts    Mark all desired items  then save and close the script  Run the edited script directly from the ESET SysInspector  main window by selecting the Run Service Script option from the File menu  When you open a script  the program  will prompt you with the following message  Are you sure you want to run the service script     Scriptname        After you confirm your selection  another warning may appear  informing you that the service script you are trying  to run has not been signed  Click Run to start the script     A dialog window will confirm that the script was successfully executed     If the script could only be partially processed  a dialog window with the following message will appear  The service  script was run partially  Do you want to view the error report  Select Yes to view a complex error report listing the  operations that were not 
223. vable media access     Enables or disables scanning triggered by accessing particular removable media with  storage space    Computer Shutdown     Enables or disables scanning triggered by computer shutdown     4 1 1 1 1 Advanced scan options    More detailed setup options can be found under Computer    Antivirus and antispyware    Real time system  protection    Advanced setup     Additional ThreatSense parameters for newly created and modified files    The probability of infection in newly created or modified files is comparatively higher than in existing files  For this  reason  the program checks these files with additional scanning parameters  Along with common signature based  scanning methods  advanced heuristics are used which can detect new threats before the virus signature database  update is released  In addition to newly created files  scanning is also performed on Self extracting archives   sfx   and Runtime packers  internally compressed executable files   By default  archives are scanned up to the 10th  nesting level and are checked regardless of their actual size  To modify archive scan settings  deselect Default  archive scan settings     21    Additional ThreatSense parameters for executed files      Advanced heuristics on file execution     By default  Advanced heuristics is used when files are executed  When  enabled  we strongly recommend keeping Smart optimization and ESET Live Grid enabled to mitigate impact on  system performance     e Advanced heuris
224. ve been infected by a virus which modifies executable   exe  files  ESET  Security solution is capable of cleaning all infected files except for explorer exe  which cannot be cleaned  evenin  Safe mode  This is because explorer exe  as one of the essential Windows processes  is launched in Safe mode as  well  ESET Security solution would not be able to perform any action with the file and it would remain infected     In this type of scenario  you could use ESET SysRescue to solve the problem  ESET SysRescue does not require any  component of the host operating system  and is therefore capable of processing  cleaning  deleting  any file on the    disk     5 8 Command Line    ESET Smart Security s antivirus module can be launched via the command line     manually  with the    ecls    command   or with a batch     bat     file  ESET Command line scanner usage     ecls  OPTIONS    FILES      The following parameters and switches can be used while running the on demand scanner from the command line     Options     base dir FOLDER   quar dir FOLDER   exclude MASK   subdir   no subdir   max subdir level LEVEL   symlink   no symlink    ads    no ads   log file FILE   log rewrite   log console   no log console   log all   no log all    aind    auto    Scanner options     files    no files    memory    boots    no boots    arch    no arch   max obj size SIZE   max arch level LEVEL   scan timeout LIMIT   max arch size SIZE   max sfx size SIZE     mail     no mail   mailbox    110    loa
225. ystem   you may need  to change the message format     Keywords  strings separated by 96 signs  are replaced in the message by the actual information as specified  The  following keywords are available      TimeStamp      Date and time of the event   96Scanner 6     Module concerned    ComputerName      Name of the computer where the alert occurred   ProgramName      Program that generated the alert   lnfectedObject      Name of infected file  message  etc  9eVirusName 6     Identification of the infection    ErrorDescription      Description of a non virus event    The keywords  infectedObject  and  VirusName  are only used in threat warning messages  and 96  ErrorDescription  is only used in event messages     Use local alphabetic characters     Converts an email message to the ANSI character encoding based upon Windows  Regional settings  e g  windows 1250   If you leave this deselected  a message will be converted and encoded in  ACSII 7 bit  for example      will be changed to  a  and an unknown symbol to          Use local character encoding     The email message source will be encoded to Quoted printable  QP  format which  uses ASCII characters and can correctly transmit special national characters by email in 8 bit format  a  idu      87    4 6 12 Submission of samples for analysis    The file submission dialog enables you to send a file or a site to ESET for analysis and can be found in Tools  gt  Submit  sample for analysis  If you find a suspiciously behaving file 
226. ywords searched for in email addresses  domain names  or IP addresses     If a whitelist works in  exclusivity mode   then messages from any other address  domain  or IP address will not be  received  If a whitelist is not exclusive  such messages will not be deleted  but filtered in some other way     A whitelist is based on the opposite principle to that of a blacklist  Whitelists are relatively easy to maintain  more  so than blacklists  We recommend that you use both the Whitelist and Blacklist to filter spam more effectively     6 4 4 3 Blacklist    Generally  a blacklist is a list of unaccepted or forbidden items or persons  In the virtual world  itis a technique  enabling acceptance of messages from all users not present on such a list     There are two types of blacklist  Those created by users within their Antispam application  and professional   regularly updated blacklists which are created by specialized institutions and can be found on the Internet     It is essential to use blacklists to successfully block spam  but they are difficult to maintain  since new items to be  blocked appear every day  We recommended you use both a whitelist and a blacklist to most effectively filter  spam     6 4 4 4 Exception list    Exception list usually contains email addresses that may be spoofed and used for sending spam  Email messages  received from addresses listed in the Exception list will always be scanned for spam  By default  the Exception list  contains all email addres
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Philips HP4698  Service Manual  LG Electronics 19LV2500 Flat Panel Television User Manual    Copyright © All rights reserved. 
   Failed to retrieve file